2016
DOI: 10.14569/ijacsa.2016.070430
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis on Host Vulnerability Evaluation of Modern Operating Systems

Abstract: Abstract-Security is a major concern in all computing environments. One way to achieve security is to deploy a secure operating system (OS). A trusted OS can actually secure all the resources and can resist the vulnerabilities and attacks effectively. In this paper, our contribution is twofold. Firstly, we critically analyze the host vulnerabilities in modern desktop OSs. We group existing approaches and provide an easy and concise view of different security models adapted by most widely used OSs. The comparis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…In particular, some scholars have conducted dedicated analyses of operating system vulnerabilities 28,29,29,30,31,32 . In the earlier stages, Chen et al 28 extensively analyzed string formatting vulnerabilities in the Debian Linux system.…”
Section: Cwe Id 416mentioning
confidence: 99%
“…In particular, some scholars have conducted dedicated analyses of operating system vulnerabilities 28,29,29,30,31,32 . In the earlier stages, Chen et al 28 extensively analyzed string formatting vulnerabilities in the Debian Linux system.…”
Section: Cwe Id 416mentioning
confidence: 99%
“…Quantitative evaluation of computer systems vulnerability is a question of great debates with many approaches proposed [36,37,38,39]. It is clear that the more vulnerabilities exist in a system, the more that system is prone to hacker attacks.…”
Section: Vulnerability Severity and Cvss-based Statisticsmentioning
confidence: 99%
“…A user is identified by a username, which is given when the user logs on to the system. Internally, a user is identified with a User Identification Number (UID), which is a numeric value selected by the system administrator at the time the account is created [26]. Some of the organizations, which develop Linux are renowned companies, such as Red Hat, Gentoo, Debian, SuSE, Turbolinux, and Ubuntu.…”
Section: Linux Operating Systemmentioning
confidence: 99%