Sciweavers

ASPLOS
2012
ACM
12 years 8 months ago
Understanding modern device drivers
Device drivers are the single largest contributor to operating-system kernel code with over 5 million lines of code in the Linux kernel, and cause significant complexity, bugs an...
Asim Kadav, Michael M. Swift
FAST
2011
13 years 3 months ago
Making the Common Case the Only Case with Anticipatory Memory Allocation
We present Anticipatory Memory Allocation (AMA), a new method to build kernel code that is robust to memoryallocation failures. AMA avoids the usual difficulties in handling allo...
Swaminathan Sundararaman, Yupu Zhang, Sriram Subra...
IEEECIT
2006
IEEE
14 years 6 months ago
A Trap-based Mechanism for Runtime Kernel Modification
Runtime modification of kernel code is a difficult problem. However, the need of modifiable kernel is increasing because new requirements and services that are unanticipated at th...
Young-Pil Kim, Jin-Hee Choi, Chuck Yoo
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 6 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
ACSAC
2008
IEEE
14 years 7 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
ACSAC
2009
IEEE
14 years 7 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...