Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Software Blogs  >  Open Source Blogs  >  Meet the ICE Linux OS open-source Blog  > 

Meet The Ice Linux Os Blog


icelinuxblog.blogspot.com
A mission to deliver unbreakable Linux deployments for the most challenging mission-critical environments.
2018-10-05 06:19
The source code for ICE Linux kernel extensions is now made available upon request. The reference software whitelisting implementation consists of set of kernel patches on top of standard De… Read More
2018-08-17 09:56
Recent news about vulnerabilities in the Intel SGX technology further escalate the argument about importance of strong software whitelisting at the operating system level. Only few syst… Read More
Attack Is The New Defense
2018-05-15 21:12
Inspired by ongoing work on writing penetration tests for the ICE Linux kernel, I have recently spent plenty of time on writing specific attack tools in order to validate the currently shipp… Read More
The Art Of Cyber Defense Part I
2018-04-25 21:38
So what does it take to successfully play defense in cyber security? Let's begin with a famous quote from General George S. Patton:Fixed fortifications are a monument to the stupidity of man… Read More
Random Musings About SDL
2018-04-25 21:36
I Recently bumped into a nice blog post about Secure Development Lifecycle (SDL) in the agile context. Disclaimer: yours truly is not particularly a fanboy of the prevailing mainstream agile… Read More
Anatomy Of An Exploit
2018-04-25 21:30
When writing security tests for ICE Linux I recently bumped into a quite interesting albeit old local Linux privilege elevation exploit. So here we go, please allow me to briefly introduce C… Read More
2018-04-03 18:08
Welcome to the ICE Linux project! ICE Linux (short for Integrity/Confidentiality Enhanced Linux) is operating system security model designed to maintain operating system secur… Read More
The Art Of Cyber Defense Part III
2018-03-24 17:11
In the second part of this post we tapped into wisdom of Sun Tzu, and concluded that to win our defensive cyber war we would prefer to defeat any offensive initiatives against our publi… Read More
The Art Of Cyber Defense Part II
2018-03-23 23:05
In the first part of this post we concluded that in order to successfully play defense in cyber security, it would be highly beneficial to be able to conceal sensitive defensive properties f… Read More
2018-03-23 09:41
First ICE Linux reference kernel is scheduled for release during second half of 2018.Inspired by the works of George R. R. Martin all ICE Linux releases will be named aft… Read More
2018-03-16 08:54
Here's roughly the technology stack in use for the reference implementation.Programming:C99PythonbashDevelopment environment:Jenkinsgit GNU MakeDebian 9KVMCryptographic moduleX.509v3ECC… Read More
2018-03-16 07:18
As briefly described in the previous post, ICE Linux aims at establishing a strong integrity foundation for building trustworthy systems. This is reasonably expected to be achievable vi… Read More
2018-03-16 07:18
Getting the ICE Linux reference implementation up and running is fairly simple. Basically, the steps needed are the following.Obtain a pre-built ICE Linux kernel package for your distributio… Read More
2018-03-14 21:25
A few months ago Tatu Ylönen posted his analysis on leaked CIA hacking tools BothanSpy and Gyrfalcon. Based on his public analysis the leaked tools deploy various code injection techniq… Read More

Share the post

Meet the ICE Linux OS

×

Subscribe to Meet The Ice Linux Os

Get updates delivered right to your inbox!

Thank you for your subscription

×