Countermeasures against kernel vulnerability attacks on an operating system (OS) are highly important kernel features. Some kernels adopt several kernel protection methods such as mandatory access control, kernel address space layout randomization, control flow integrity, and kernel page table isolation; however, kernel vulnerabilities can still be exploited to execute attack codes and corrupt kernel memory. To accomplish this, adversaries subvert kernel protection methods and invoke these kernel codes to avoid administrator privileges restrictions and gain complete control of the target host. To prevent such subversion, we present Multiple Kernel Memory (MKM), which offers a novel security mechanism using an alternative design for kernel m...
The kernel code injection is a common behavior of kernel-compromising attacks where the attackers ai...
The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspe...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Countermeasures against kernel vulnerability attacks on an operating system (OS) are highly importan...
Operating systems adopt kernel protection methods (e.g., mandatory access control, kernel address sp...
Recent operating systems (OSs) have adopted a defense mechanism called kernel page table isolation (...
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB...
Operating system kernels isolate applications from other malicious software via protected memory cr...
© 2020 Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI...
Kernel information leak vulnerabilities are a major security threat to production systems. Attackers...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
We present a new system, KCoFI, that is the first we know of to provide complete Control-Flow Integr...
The kernel code injection is a common behavior of kernel-compromising attacks where the attackers ai...
The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspe...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Countermeasures against kernel vulnerability attacks on an operating system (OS) are highly importan...
Operating systems adopt kernel protection methods (e.g., mandatory access control, kernel address sp...
Recent operating systems (OSs) have adopted a defense mechanism called kernel page table isolation (...
Commodity operating systems such as Windows, Linux, and MacOS X form the Trusted Computing Base (TCB...
Operating system kernels isolate applications from other malicious software via protected memory cr...
© 2020 Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI...
Kernel information leak vulnerabilities are a major security threat to production systems. Attackers...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
Return-to-user (ret2usr) attacks redirect corrupted kernel pointers to data residing in user space. ...
ROP attack introduced briefly in this paper is a serious threat to compute systems. Kernel ROP attac...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
We present a new system, KCoFI, that is the first we know of to provide complete Control-Flow Integr...
The kernel code injection is a common behavior of kernel-compromising attacks where the attackers ai...
The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspe...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...