Zobrazeno 1 - 10
of 275
pro vyhledávání: '"Configfs"'
Autor:
Brent Byunghoon Kang, Hyungon Moon, Yunheung Paek, Ingoo Heo, Kihwan Kim, Jinsoo Jang, Hojoon Lee, Daehee Jang
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:287-300
External hardware-based kernel integrity monitors have been proposed to mitigate kernel-level malwares. However, the existing external approaches have been limited to monitoring the static regions of kernel while the latest rootkits manipulate the dy
Autor:
Evgeny Novikov
Publikováno v:
Труды Института системного программирования РАН, Vol 29, Iss 2, Pp 77-96 (2018)
Existing research analyzing evolution of the Linux kernel considers the kernel together with loadable modules delivered with it or some specific subsystems of the kernel. The aim of this paper is to evaluate evolution of the kernel without loadable m
Autor:
V S Mutilin, S V Kozin
Publikováno v:
Труды Института системного программирования РАН, Vol 29, Iss 4, Pp 217-230 (2018)
The Linux kernel is often used as a real world case study to demonstrate novel software product line engineering research methods. It is one of the most sophisticated programs nowadays. To provide the most safe experience of building of Linux product
Publikováno v:
Computers & Security. 72:96-106
Many defensive approaches have been proposed to protect the integrity of the operating system kernel stack. However, some types of attacks, such as the “return-to-schedule” rootkit, pose a serious threat to these approaches. In this paper, we pre
Publikováno v:
Soft Computing. 22:7977-7987
Kernel control-flow integrity (CFI) of virtual machines is very important to cloud security. VMI-based dynamic tracing and analyzing methods are promising options for checking kernel CFI in cloud. However, the CFI monitors based on tracing always wor
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 28:1715-1727
Graphics processing unit (GPU) programming environments have matured for general-purpose computing on GPUs. Significant challenges for GPUs include system software support for bounded response times and guaranteed throughput. In recent years, GPU tec
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 13:568-581
VM-based inspection tools generally implement probes in the hypervisor to monitor events and the state of kernel of the guest system. The most important function of a probe is to carve information of interest out of the memory of the guest when it is
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 41-47 (2016)
FRUCT
FRUCT
Prototyping and debugging of operating systems and drivers are very tough tasks because of hardware volatility, kernel panics, blue screens of death, long periods of time required to expose the bug, perturbation of the drivers by the debugger, and no
Publikováno v:
APSys
Existing operating systems share a common kernel text section amongst all processes. It is not possible to perform kernel specialization or tuning such that different applications execute text optimized for their kernel use despite the benefits of ke
Autor:
Xueyang Wang, Ramesh Karri
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 35:485-498
Kernel rootkits are formidable threats to computer systems. They are stealthy and can have unrestricted access to system resources. This paper presents NumChecker, a new virtual machine (VM) monitor based framework to detect and identify control-flow