Sciweavers

181 search results - page 2 / 37
» Code Compaction of an Operating System Kernel
Sort
View
ACSAC
2004
IEEE
13 years 8 months ago
Detecting Exploit Code Execution in Loadable Kernel Modules
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of kernel memory and I/O space. As a result, kernel-modu...
Haizhi Xu, Wenliang Du, Steve J. Chapin
ASPLOS
2011
ACM
12 years 8 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
SOSP
1989
ACM
13 years 6 months ago
Threads and Input/Output in the Synthesis Kernel
The Synthesis operating system kernel combines several techniques to provide high performa.nce, incl1iding kernel code synthesis, fine-gra.in scheduling. and optimistic sylicllrol...
Henry Massalin, Calton Pu
ACSAC
2009
IEEE
13 years 11 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
ACSAC
2009
IEEE
13 years 11 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...