Sciweavers

43 search results - page 1 / 9
» Protecting Commodity Operating System Kernels from Vulnerabl...
Sort
View
ACSAC
2009
IEEE
13 years 11 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
SOSP
2003
ACM
14 years 1 months ago
Improving the reliability of commodity operating systems
Despite decades of research in extensible operating system technology, extensions such as device drivers remain a significant cause of system failures. In Windows XP, for example,...
Michael M. Swift, Brian N. Bershad, Henry M. Levy
HOTOS
2007
IEEE
13 years 8 months ago
Microdrivers: A New Architecture for Device Drivers
Commodity operating systems achieve good performance by running device drivers in-kernel. Unfortunately, this architecture offers poor fault isolation. This paper introduces micro...
Vinod Ganapathy, Arini Balakrishnan, Michael M. Sw...
USENIX
2008
13 years 7 months ago
Protection Strategies for Direct Access to Virtualized I/O Devices
Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory ma...
Paul Willmann, Scott Rixner, Alan L. Cox
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 4 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti