Today’s operating systems are large, complex, and plagued with vulnerabilities that allow perpetrators to exploit them for profit. The constant rise in the number of software weaknesses, coupled with the sophistication of modern adversaries, make the need for effective and adaptive defenses more critical than ever. In this dissertation, we develop a set of novel protection mechanisms, and introduce new concepts and techniques to secure commodity operating systems against attacks that exploit vulnerabilities in kernel code. Modern OSes opt for a shared process/kernel model to minimize the overhead of operations that cross protection domains. However, this design choice provides a unique vantage point to local attackers, as it allows th...
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB...
Intra-process memory isolation can improve security by enforcing least-privilege at a finer granular...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Modern operating systems are often the target of attacks that exploit vulnerabilities to escalate th...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
Return-to-user (ret2usr) attacks exploit the operating sys-tem kernel, enabling local users to hijac...
Return-to-user (ret2usr) attacks exploit the operating sys-tem kernel, enabling local users to hijac...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Operating system kernels isolate applications from other malicious software via protected memory cr...
Operating systems adopt kernel protection methods (e.g., mandatory access control, kernel address sp...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB...
Intra-process memory isolation can improve security by enforcing least-privilege at a finer granular...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Modern operating systems are often the target of attacks that exploit vulnerabilities to escalate th...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
Return-to-user (ret2usr) attacks exploit the operating sys-tem kernel, enabling local users to hijac...
Return-to-user (ret2usr) attacks exploit the operating sys-tem kernel, enabling local users to hijac...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Operating system kernels isolate applications from other malicious software via protected memory cr...
Operating systems adopt kernel protection methods (e.g., mandatory access control, kernel address sp...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB...
Intra-process memory isolation can improve security by enforcing least-privilege at a finer granular...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...