Proceedings of the 2nd International Conference on Soft Computing in Information Communication Technology

Overview of Linux Vulnerabilities

Authors
Shuangxia Niu, Jiansong Mo, Zhigang Zhang, Zhuo Lv
Corresponding Author
Shuangxia Niu
Available Online May 2014.
DOI
https://doi.org/10.2991/scict-14.2014.55How to use a DOI?
Keywords
Linux vulnerabilities ;security measures; harden -ing; LSM
Abstract
Various advanced key technologies can be effectively implemented on Linux cause its stability, high efficiency and open source nature. However, Linux Operating System(OS) itself and some of the services Linux-based inevitably have their vulnerability, namely Linux is not absolutely safe. This paper attempts to review and discuss the Linux vulnerabilities, which originates from Linux OS itself and some of the services shipped in Linux, with related cases presented. And Linux security enhancements, Linux OS hardening and Linux Security Modules (LSM),are systematically described and studied.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Cite this article

TY  - CONF
AU  - Shuangxia Niu
AU  - Jiansong Mo
AU  - Zhigang Zhang
AU  - Zhuo Lv
PY  - 2014/05
DA  - 2014/05
TI  - Overview of Linux Vulnerabilities
BT  - Proceedings of the 2nd International Conference on Soft Computing in Information Communication Technology
PB  - Atlantis Press
SP  - 225
EP  - 228
SN  - 1951-6851
UR  - https://doi.org/10.2991/scict-14.2014.55
DO  - https://doi.org/10.2991/scict-14.2014.55
ID  - Niu2014/05
ER  -