메뉴 건너뛰기




Volumn , Issue , 2009, Pages 301-310

Protecting commodity operating system kernels from vulnerable device drivers

Author keywords

[No Author keywords available]

Indexed keywords

BUFFER OVERRUN; COMMODITY OPERATING SYSTEMS; CRITICAL CODES; DEVICE DRIVER; LINUX IMPLEMENTATION; PACKET PROCESSING; RUNTIMES; SECURITY ARCHITECTURE;

EID: 77950823828     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2009.35     Document Type: Conference Paper
Times cited : (21)

References (42)
  • 3
    • 77950798861 scopus 로고
    • Give a process to your drivers!
    • Francois Armand. Give a process to your drivers! In EurOpen Autumn 1991, 1991.
    • (1991) EurOpen Autumn 1991
    • Armand, F.1
  • 5
    • 60649106745 scopus 로고    scopus 로고
    • Automatic inference and enforcement of kernel data structure invariants
    • A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structure invariants. In ACSAC, 2008.
    • (2008) ACSAC
    • Baliga, A.1    Ganapathy, V.2    Iftode, L.3
  • 6
    • 85084162921 scopus 로고    scopus 로고
    • Privtrans: Automatically partitioning programs for privilege separation
    • D. Brumley and D. Song. Privtrans: Automatically partitioning programs for privilege separation. In USENIX Security, 2004.
    • (2004) USENIX Security
    • Brumley, D.1    Song, D.2
  • 7
    • 77950850998 scopus 로고    scopus 로고
    • Remote and local exploitation of network drivers
    • Yuriy Bulygin. Remote and local exploitation of network drivers. In Blackhat-USA, 2007.
    • (2007) Blackhat-USA
    • Bulygin, Y.1
  • 11
    • 33748053715 scopus 로고    scopus 로고
    • Get more device drivers out of the kernel!
    • P. Chubb. Get more device drivers out of the kernel! In Ottawa Linux Symp., pages 149-161, 2004.
    • (2004) Ottawa Linux Symp. , pp. 149-161
    • Chubb, P.1
  • 12
    • 70349754986 scopus 로고    scopus 로고
    • Swaddler: An approach for the anomaly-based detection of state violations in web applications
    • M. Cova, D. Balzarotti, V. Felmgester, and G. Vigna. Swaddler: An approach for the anomaly-based detection of state violations in web applications. In RAID, 2007.
    • (2007) RAID
    • Cova, M.1    Balzarotti, D.2    Felmgester, V.3    Vigna, G.4
  • 13
    • 72249097897 scopus 로고    scopus 로고
    • Available at
    • Coverity. Anaylsis of the Linux kernel, 2004. Available at http://www.coverity.com.
    • (2004) Anaylsis of the Linux Kernel
  • 14
    • 34247373512 scopus 로고    scopus 로고
    • Inference and enforcement of data structure consistency specifications
    • Brian Demsky, Michael D. Ernst, Philip J. Guo, Stephen McCamant, Jeff H. Perkins, and Martin Rinard. Inference and enforcement of data structure consistency specifications. In ISSTA, 2006.
    • (2006) ISSTA
    • Demsky, B.1    Ernst, M.D.2    Guo, P.J.3    McCamant, S.4    Perkins, J.H.5    Rinard, M.6
  • 16
    • 77950809716 scopus 로고    scopus 로고
    • FUSD: A Linux framework for user-space devices
    • J. Elson. FUSD: A Linux framework for user-space devices, 2004. User manual for FUSD 1.0.
    • (2004) User Manual for FUSD 1.0
    • Elson, J.1
  • 22
    • 0036038345 scopus 로고    scopus 로고
    • Tracking down software bugs using automatic anomaly detection
    • S. Hangal and M. S. Lam. Tracking down software bugs using automatic anomaly detection. In ICSE, 2002.
    • (2002) ICSE
    • Hangal, S.1    Lam, M.S.2
  • 25
    • 84867853619 scopus 로고    scopus 로고
    • Unmodified device driver reuse and improved system dependability via virtual machines
    • J. LeVasseur, V. Uhlig, J. Stoess, and S. Gotz. Unmodified device driver reuse and improved system dependability via virtual machines. In OSDI, 2004.
    • (2004) OSDI
    • LeVasseur, J.1    Uhlig, V.2    Stoess, J.3    Gotz, S.4
  • 26
    • 77950815234 scopus 로고
    • On μ-kernel construction
    • J. Liedtke. On μ-kernel construction. In ACM SOSP, 1995.
    • (1995) ACM SOSP
    • Liedtke, J.1
  • 30
    • 77950810715 scopus 로고    scopus 로고
    • CVEs 2007-4571, 2007-05, 2007-4308, 2008-0007, 2005-0504, 2006-2935, 2006-2936, 2005-3180, 2004-1017, 2007-4997, 2006-11368
    • Linux device driver vulnerabilities from the MITRE database. CVEs 2007-4571, 2007-05, 2007-4308, 2008-0007, 2005-0504, 2006-2935, 2006-2936, 2005-3180, 2004-1017, 2007-4997, 2006-11368
    • Linux Device Driver Vulnerabilities from the MITRE Database
  • 33
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
    • N. L. Petroni, T. Fraser, A. Walters, and W. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security Symposium, 2006.
    • USENIX Security Symposium, 2006
    • Petroni, N.L.1    Fraser, T.2    Walters, A.3    Arbaugh, W.4
  • 34
    • 50249114395 scopus 로고    scopus 로고
    • Automated detection of persistent kernel control- ow attacks
    • N. L. Petroni and M. W. Hicks. Automated detection of persistent kernel control- ow attacks. In ACM CCS, 2007.
    • (2007) ACM CCS
    • Petroni, N.L.1    Hicks, M.W.2
  • 38


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.