Jaeger T.,University Park |
Van Oorschot P.C.,1125 Colonel By Drive |
Wurster G.,1125 Colonel By Drive
Computers and Security | Year: 2011
Motivated by the goal of hardening operating system kernels against rootkits and related malware, we survey the common interfaces and methods which can be used to modify (either legitimately or maliciously) the kernel which is run on a commodity desktop computer. We also survey how these interfaces can be restricted or disabled. While we concentrate mainly on Linux, many of the methods for modifying kernel code also exist on other operating systems, some of which are discussed. © 2011 Elsevier Ltd. All rights reserved.
Thorngate W.,1125 Colonel By Drive |
Liu J.,1125 Colonel By Drive |
Chowdhury W.,Cognitive Science
JASSS | Year: 2011
Whenever the amount of information produced exceeds the amount of attention available to consume it, a competition for attention is born. The competition is increasingly fierce in science where the exponential growth of information has forced its producers, consumers and gatekeepers to become increasingly selective in what they attend to and what they ignore. Paradoxically, as the criteria of selection among authors, editors and readers of scientific journal articles co-evolve, they show signs of becoming increasingly unscientific. The present article suggests how the paradox can be addressed with computer simulation, and what its implications for the future of science might be. © Copyright JASSS.