Zobrazeno 1 - 10
of 286
pro vyhledávání: '"sysfs"'
Autor:
Brent Byunghoon Kang, Hyungon Moon, Yunheung Paek, Ingoo Heo, Kihwan Kim, Jinsoo Jang, Hojoon Lee, Daehee Jang
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:287-300
External hardware-based kernel integrity monitors have been proposed to mitigate kernel-level malwares. However, the existing external approaches have been limited to monitoring the static regions of kernel while the latest rootkits manipulate the dy
Autor:
Mojtaba Bagherzadeh, James R. Cordy, Nafiseh Kahani, Ahmed Hassan, Cor-Paul Bezemer, Juergen Dingel
Publikováno v:
ICSE
The Linux kernel provides its services to the application layer using so-called system calls. All system calls combined form the Application Programming Interface (API) of the kernel. Hence, system calls provide us with a window into the development
Publikováno v:
Soft Computing. 22:7977-7987
Kernel control-flow integrity (CFI) of virtual machines is very important to cloud security. VMI-based dynamic tracing and analyzing methods are promising options for checking kernel CFI in cloud. However, the CFI monitors based on tracing always wor
Publikováno v:
IJARCCE. 6:378-381
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 28:1715-1727
Graphics processing unit (GPU) programming environments have matured for general-purpose computing on GPUs. Significant challenges for GPUs include system software support for bounded response times and guaranteed throughput. In recent years, GPU tec
Publikováno v:
China Communications. 13:143-152
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack, many protection methods are proposed in recent years. However, most of these existing methods focus on user-level heap o
Publikováno v:
HPDC
As OS-level virtualization advances, containers have become a viable alternative to virtual machines in deploying applications in the cloud. Unlike virtual machines, which allow guest OSes to run atop virtual hardware, containers have direct access t
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 13:568-581
VM-based inspection tools generally implement probes in the hypervisor to monitor events and the state of kernel of the guest system. The most important function of a probe is to carve information of interest out of the memory of the guest when it is
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 41-47 (2016)
FRUCT
FRUCT
Prototyping and debugging of operating systems and drivers are very tough tasks because of hardware volatility, kernel panics, blue screens of death, long periods of time required to expose the bug, perturbation of the drivers by the debugger, and no
Publikováno v:
APSys
Existing operating systems share a common kernel text section amongst all processes. It is not possible to perform kernel specialization or tuning such that different applications execute text optimized for their kernel use despite the benefits of ke