Now showing items 1-2 of 2

    • An Historical Analysis of SE Android Policy 

      Im, Bumjin (2018-05-29)
      Android adopted SELinux’s mandatory access control mechanisms in 2013, and since then billions of Android devices are now benefiting from MAC security policies, enforced in the OS kernel. Initially, Android took a gentle approach, with a large number of resources “unconfined”, but the policies are now quite detailed and comprehensive. This paper ...
    • Safe and Secure Subprocess Virtualization in Userspace. 

      Im, Bumjin (2021-08-13)
      Commodity operating systems isolate the application with process boundary, and all the developers develop the applications upon the principle. However, the applications cannot simply trust the process-based isolation. Virtually all the applications link at least one dynamic library on the runtime that the libraries share all the resources in the same ...