Operating system kernels isolate applications from other malicious software via protected memory created by virtual memory management. Even though modern kernels aggregate core kernel code with driver and module components of different provenance, kernel memory remains unified and without isolation. Kernel-level malicious software has full access to the data and operations of all kernel components. In this paper, we create kernel memory protection. We design an access control policy and enforcement system that prevents kernel components with low trust from altering security-critical data used by the kernel to manage its own execution. Our policies are at the granularity of kernel variables and structure elements, and they can protect...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
Monolithic operating system designs undermine the security of computing systems by allowing single e...
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Kernel rootkits pose significant challenges on defensive techniques as they run at the highest privi...
One of the main issues in the OS security is providing trusted code execution in an untrusted enviro...
Operating systems adopt kernel protection methods (e.g., mandatory access control, kernel address sp...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
As the foundation of the trusted computing base, the operating system kernel is a valuable target f...
Kernel extensions are widely used by attackers to com-promise the operating system kernel. With the ...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Small kernels are a promising approach to secure and reliable system construction. These systems red...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
Monolithic operating system designs undermine the security of computing systems by allowing single e...
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
Kernel rootkits pose significant challenges on defensive techniques as they run at the highest privi...
One of the main issues in the OS security is providing trusted code execution in an untrusted enviro...
Operating systems adopt kernel protection methods (e.g., mandatory access control, kernel address sp...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
As the foundation of the trusted computing base, the operating system kernel is a valuable target f...
Kernel extensions are widely used by attackers to com-promise the operating system kernel. With the ...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
An attacker who has gained access to a computer may want to upload or modify configuration files, et...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Small kernels are a promising approach to secure and reliable system construction. These systems red...
Abstract—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are a...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
Monolithic operating system designs undermine the security of computing systems by allowing single e...
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in...