|
A.0 Background Information on AppArmor Profiling
For more information about the science and security of Novell AppArmor, refer to the
following papers:
- SubDomain: Parsimonious Server Security by
Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle,
and Virgil Gligor
-
Describes the initial design and implementation of Novell AppArmor. Published
in the proceedings of the USENIX LISA Conference, December 2000, New
Orleans, LA.
This paper is now out of date, describing syntax and features that are
different from the current Novell AppArmor product. This paper should be used only
for scientific background and not for technical documentation.
- Defcon Capture the Flag: Defending Vulnerable Code from
Intense Attack by Crispin Cowan, Seth Arnold, Steve Beattie,
Chris Wright, and John Viega
-
A good guide to strategic and tactical use of Novell AppArmor to solve severe
security problems in a very short period of time. Published in the
Proceedings of the DARPA Information Survivability Conference and Expo
(DISCEX III), April 2003, Washington, DC.
- AppArmor for Geeks by Seth Arnold
-
This document tries to convey a better understanding of
the technical details of AppArmor. It is available at https://en.opensuse.org/AppArmor_Geeks.
- AppArmor Technical Documentation by Andreas
Gruenbacher and Seth Arnold
-
This document discusses the concept and design of AppArmor from a very
technical point of view. It is available at https://forgeftp.novell.com//apparmor/LKML_Submission-June-07/techdoc.html.
|
|