Proceedings of the 2nd International Conference on Soft Computing in Information Communication Technology 2014
DOI: 10.2991/scict-14.2014.55
|View full text |Cite
|
Sign up to set email alerts
|

Overview of Linux Vulnerabilities

Abstract: Various advanced key technologies can be effectively implemented on Linux cause its stability, high efficiency and open source nature. However, Linux Operating System(OS) itself and some of the services Linux-based inevitably have their vulnerability, namely Linux is not absolutely safe. This paper attempts to review and discuss the Linux vulnerabilities, which originates from Linux OS itself and some of the services shipped in Linux, with related cases presented. And Linux security enhancements, Linux OS hard… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…With the large number of lines of codes in an OS, different exploits that result in kernel-level access for commodity OSes have been shown [37,30,27]. The goal of the attacker is to crash the system or create system performance attack with security analyst (e.g., IT professional) unable to determine the source of the attack.…”
Section: Threat Modelmentioning
confidence: 99%
“…With the large number of lines of codes in an OS, different exploits that result in kernel-level access for commodity OSes have been shown [37,30,27]. The goal of the attacker is to crash the system or create system performance attack with security analyst (e.g., IT professional) unable to determine the source of the attack.…”
Section: Threat Modelmentioning
confidence: 99%
“…This work is different from our paper since they create the tool to generate attack graphs, whereas our work is mainly focused on studying the potential attack types based on CWE-IDs. The other similar research includes individual vulnerability assessments, i.e., studies specific to Windows [11], Linux [12], Android [13], etc. The specific study does not provide the big picture of OS security or where the specific OS stands in the vulnerabilities study.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, assuming attackers have the root privilege is permissible when the victim procedures are in TEE. Besides, there are many legal or illegal ways for attackers to gain such privilege [37,53].…”
Section: Assumption and Threat Modelmentioning
confidence: 99%