-
2
-
-
0001916468
-
Mach: A new kernel foundation for UNIX development
-
ACCETTA, M. J., and BARON., R. V., BOLOSKY, W. J., GOLUB, D. B., and RASHID., R. F., TEVANIAN, A., and YOUNG, M. Mach: A New Kernel Foundation for UNIX Development. In Proc. of USENIX Summer (1986), pp. 93-113.
-
(1986)
Proc. Of USENIX Summer
, pp. 93-113
-
-
Accetta, M.J.1
Baron, R.V.2
Bolosky, W.J.3
Golub, D.B.4
Rashid, R.F.5
Tevanian, A.6
Young, M.7
-
3
-
-
85080638430
-
Binding the daemon: FreeBSD kernel stack and heap exploitation
-
ARGYROUDIS, P. Binding the Daemon: FreeBSD Kernel Stack and Heap Exploitation. In Black Hat USA (2010).
-
(2010)
Black Hat USA
-
-
Argyroudis, P.1
-
4
-
-
85080788753
-
-
Tech. rep., Advanced RISC Machine (ARM), July
-
ARM® ARCHITECTURE REFERENCE MANUAL. ARM®v7-A and ARM®v7-R edition. Tech. rep., Advanced RISC Machine (ARM), July 2012.
-
(2012)
ARM®v7-A and ARM®v7-R Edition
-
-
-
6
-
-
85084162449
-
The slab allocator: An object-caching kernel memory allocator
-
BONWICK, J. The Slab Allocator: An Object-Caching Kernel Memory Allocator. In Proc. of USENIX Summer (1994), pp. 87-98.
-
(1994)
Proc. Of USENIX Summer
, pp. 87-98
-
-
Bonwick, J.1
-
8
-
-
78650032454
-
Return-oriented programming without returns
-
CHECKOWAY, S., DAVI, L., DMITRIENKO, A., SADEGHI, A.-R., SHACHAM, H., and WINANDY, M. Return-Oriented Programming without Returns. In Proc. of CCS (2010), pp. 559-572.
-
(2010)
Proc. Of CCS
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
9
-
-
84863145383
-
Linux kernel vulnerabilities: State-of-the-art defenses and open problems
-
CHEN, H., MAO, Y., WANG, X., ZHOU, D., ZELDOVICH, N., and KAASHOEK, M. F. Linux kernel vulnerabilities: State-of-the-art defenses and open problems. In Proc. of APsys (2011), pp. 51-55.
-
(2011)
Proc. Of APsys
, pp. 51-55
-
-
Chen, H.1
Mao, Y.2
Wang, X.3
Zhou, D.4
Zeldovich, N.5
Kaashoek, M.F.6
-
10
-
-
85080647848
-
-
March
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2005-0736, March 2005.
-
(2005)
CVE-2005-0736
-
-
-
11
-
-
85080780329
-
-
May
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2009-1527, May 2009.
-
(2009)
CVE-2009-1527
-
-
-
12
-
-
85080672894
-
-
August
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2009-2698, August 2009.
-
(2009)
CVE-2009-2698
-
-
-
13
-
-
85080679547
-
-
August
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2009-3002, August 2009.
-
(2009)
CVE-2009-3002
-
-
-
14
-
-
85080649979
-
-
September
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2009-3234, September 2009.
-
(2009)
CVE-2009-3234
-
-
-
15
-
-
85080727108
-
-
October
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2009-3547, October 2009.
-
(2009)
CVE-2009-3547
-
-
-
16
-
-
85080673075
-
-
August
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2010-2959, August 2010.
-
(2010)
CVE-2010-2959
-
-
-
17
-
-
85019190995
-
-
September
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2010-3437, September 2010.
-
(2010)
CVE-2010-3437
-
-
-
18
-
-
85080694362
-
-
October
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2010-3904, October 2010.
-
(2010)
CVE-2010-3904
-
-
-
19
-
-
85080759298
-
-
October
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2010-4073, October 2010.
-
(2010)
CVE-2010-4073
-
-
-
20
-
-
85080757671
-
-
November
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2010-4347, November 2010.
-
(2010)
CVE-2010-4347
-
-
-
21
-
-
85080777184
-
-
February
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2012-0946, February 2012.
-
(2012)
CVE-2012-0946
-
-
-
22
-
-
85080709607
-
-
December
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2013-0268, December 2013.
-
(2013)
CVE-2013-0268
-
-
-
23
-
-
85080689656
-
-
February
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2013-1828, February 2013.
-
(2013)
CVE-2013-1828
-
-
-
24
-
-
85009072862
-
-
February
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2013-2094, February 2013.
-
(2013)
CVE-2013-2094
-
-
-
25
-
-
85080646267
-
-
April
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2013-2852, April 2013.
-
(2013)
CVE-2013-2852
-
-
-
26
-
-
85080785104
-
-
August
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2013-2892, August 2013.
-
(2013)
CVE-2013-2892
-
-
-
27
-
-
85080752016
-
-
June
-
COMMON VULNERABILITIES and EXPOSURES. CVE-2013-4343, June 2013.
-
(2013)
CVE-2013-4343
-
-
-
32
-
-
84889026875
-
-
Tech. rep., Linux Foundation, September
-
CORBET, J., KROAH-HARTMAN, G., and MCPHERSON, A. Linux Kernel Development. Tech. rep., Linux Foundation, September 2013.
-
(2013)
Linux Kernel Development
-
-
Corbet, J.1
Kroah-Hartman, G.2
Mcpherson, A.3
-
33
-
-
78751539789
-
Heap taichi: Exploiting memory allocation granularity in heap-spraying attacks
-
DING, Y., WEI, T., WANG, T., LIANG, Z., and ZOU, W. Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks. In Proc. of ACSAC (2010), pp. 327-336.
-
(2010)
Proc. Of ACSAC
, pp. 327-336
-
-
Ding, Y.1
Wei, T.2
Wang, T.3
Liang, Z.4
Zou, W.5
-
34
-
-
85080679253
-
-
Use Linux, BSD., November
-
DISTROWATCH. Put the fun back into computing. Use Linux, BSD., November 2013. http://distrowatch.com.
-
(2013)
Put the Fun Back into Computing
-
-
-
36
-
-
85080707234
-
-
December
-
EXPLOIT DATABASE. EBD-131, December 2003.
-
(2003)
EBD-131
-
-
-
37
-
-
85080642388
-
-
September
-
EXPLOIT DATABASE. EBD-16835, September 2009.
-
(2009)
EBD-16835
-
-
-
38
-
-
85080749293
-
-
August
-
EXPLOIT DATABASE. EBD-14814, August 2010.
-
(2010)
EBD-14814
-
-
-
39
-
-
85080728189
-
-
September
-
EXPLOIT DATABASE. EBD-15150, September 2010.
-
(2010)
EBD-15150
-
-
-
40
-
-
85080750679
-
-
October
-
EXPLOIT DATABASE. EBD-15285, October 2010.
-
(2010)
EBD-15285
-
-
-
41
-
-
85080780706
-
-
January
-
EXPLOIT DATABASE. EBD-15916, January 2011.
-
(2011)
EBD-15916
-
-
-
42
-
-
85080638270
-
-
June
-
EXPLOIT DATABASE. EBD-17391, June 2011.
-
(2011)
EBD-17391
-
-
-
43
-
-
85080772165
-
-
September
-
EXPLOIT DATABASE. EBD-17787, September 2011.
-
(2011)
EBD-17787
-
-
-
44
-
-
85080674522
-
-
August
-
EXPLOIT DATABASE. EBD-20201, August 2012.
-
(2012)
EBD-20201
-
-
-
45
-
-
85080699375
-
-
February
-
EXPLOIT DATABASE. EBD-24555, February 2013.
-
(2013)
EBD-24555
-
-
-
47
-
-
85080730794
-
-
November
-
GOOGLE. Android, November 2013. http://www.android.com.
-
(2013)
-
-
-
48
-
-
85080722301
-
-
November
-
GOOGLE. Chromium OS, November 2013. http://www.chromium.org/chromium-os.
-
(2013)
-
-
-
49
-
-
0024089972
-
The confused deputy: (or why capabilities might have been invented)
-
October
-
HARDY, N. The Confused Deputy: (or why capabilities might have been invented). SIGOPS Oper. Syst. Rev. 22 (October 1988), 36-38.
-
(1988)
SIGOPS Oper. Syst. Rev.
, vol.22
, pp. 36-38
-
-
Hardy, N.1
-
50
-
-
33748059856
-
MINIX 3: A highly reliable, self-repairing operating system
-
July
-
HERDER, J. N., BOS, H., GRAS, B., HOMBURG, P., and TANENBAUM, A. S. MINIX 3: A Highly Reliable, Self-Repairing Operating System. SIGOPS Oper. Syst. Rev. 40, 3 (July 2006), 80-89.
-
(2006)
SIGOPS Oper. Syst. Rev.
, vol.40
, Issue.3
, pp. 80-89
-
-
Herder, J.N.1
Bos, H.2
Gras, B.3
Homburg, P.4
Tanenbaum, A.S.5
-
51
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
HUND, R., HOLZ, T., and FREILING, F. C. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. In Proc. ofUSENIXSec (2009), pp. 384-398.
-
(2009)
Proc. OfUSENIXSec
, pp. 384-398
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
-
52
-
-
38349068551
-
Singularity: Rethinking the software stack
-
April
-
HUNT, G. C, and LARUS, J. R. Singularity: Rethinking the Software Stack. SIGOPS Oper. Syst. Rev. 41, 2 (April 2007), 37-49.
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, Issue.2
, pp. 37-49
-
-
Hunt, G.C.1
Larus, J.R.2
-
54
-
-
84945176559
-
-
Tech. rep., Intel Corporation, January
-
INTEL® 64 AND IA-32 ARCHITECTURES SOFTWARE DEVELOPER'S MANUAL. Instruction Set Extensions Programming Reference. Tech. rep., Intel Corporation, January 2013.
-
(2013)
Instruction Set Extensions Programming Reference
-
-
-
55
-
-
85080669280
-
-
Tech. rep., Intel Corporation, September
-
INTEL® 64 AND IA-32 ARCHITECTURES SOFTWARE DEVELOPER'S MANUAL. System Programming Guide, Part 1. Tech. rep., Intel Corporation, September 2013.
-
(2013)
System Programming Guide, Part 1
-
-
-
56
-
-
84878345548
-
Memento: Learning secrets from process footprints
-
JANA, S., and SHMATIKOV, V. Memento: Learning Secrets from Process Footprints. In Proc. of IEEE S & P (2012), pp. 143-157.
-
(2012)
Proc. Of IEEE S & P
, pp. 143-157
-
-
Jana, S.1
Shmatikov, V.2
-
57
-
-
85030776494
-
kGuard: Lightweight kernel protection against return-to-user attacks
-
KEMERLIS, V. P., PORTOKALIDIS, G., and KEROMYTIS, A. D. kGuard: Lightweight Kernel Protection against Return-to-user Attacks. In Proc. of USENIX Sec (2012), pp. 459-474.
-
(2012)
Proc. Of USENIX Sec
, pp. 459-474
-
-
Kemerlis, V.P.1
Portokalidis, G.2
Keromytis, A.D.3
-
61
-
-
0000082224
-
A fast storage allocator
-
October
-
KNOWLTON, K. C. A fast storage allocator. Commun. ACM 8, 10 (October 1965), 623-624.
-
(1965)
Commun. ACM
, vol.8
, Issue.10
, pp. 623-624
-
-
Knowlton, K.C.1
-
62
-
-
84976855523
-
Architecture support for single address space operating systems
-
KOLDINGER, E. J., and CHASE., J. S., and EGGERS, S. J. Architecture Support for Single Address Space Operating Systems. In Proc. ofASPLOS (1992), pp. 175-186.
-
(1992)
Proc. OfASPLOS
, pp. 175-186
-
-
Koldinger, E.J.1
Chase, J.S.2
Eggers, S.J.3
-
63
-
-
84883112165
-
Attack surface metrics and automated compile-time OS kernel tailoring
-
KURMUS, A., TARTLER, R., DORNEANU, D., HEINLOTH, B., ROTHBERG, V., RUPRECHT, A., SCHRÖDER-PREIKSCHAT, W., LOHMANN, D., AND KAPITZA, R. Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring. In Proc. of NDSS (2013).
-
(2013)
Proc. Of NDSS
-
-
Kurmus, A.1
Tartler, R.2
Dorneanu, D.3
Heinloth, B.4
Rothberg, V.5
Ruprecht, A.6
Schröder-Preikschat, W.7
Lohmann, D.8
Kapitza, R.9
-
66
-
-
85080731382
-
On jU-kernel construction
-
LIEDTKE, J. On jU-Kernel Construction. In Proc. of SOSP (1984), pp. 237-250.
-
(1984)
Proc. Of SOSP
, pp. 237-250
-
-
Liedtke, J.1
-
72
-
-
84909595937
-
-
November
-
MOZILLA. Firefox OS, November 2013. https://www.mozilla.org/en-US/firefox/os/.
-
(2013)
Firefox OS
-
-
-
73
-
-
85080688044
-
-
November
-
NATIONAL VULNERABILITY DATABASE. Kernel Vulnerabilities, November 2013. http://goo.gl/GJpw0b.
-
(2013)
Kernel Vulnerabilities
-
-
-
75
-
-
84924652861
-
-
November
-
OFFENSIVE SECURITY. The Exploit Database, November 2013. http://www.exploit-db.com.
-
(2013)
The Exploit Database
-
-
-
77
-
-
85080786111
-
-
November
-
PAX. Homepage of The PaX Team, November 2013. http://pax.grsecurity.net.
-
(2013)
Homepage of the PaX Team
-
-
-
78
-
-
85061234965
-
-
April
-
PAX TEAM. UDEREF/i386, April 2007. http://grsecurity.net/~spender/uderef.txt.
-
(2007)
UDEREF/i386
-
-
-
79
-
-
85019251939
-
-
April
-
PAX TEAM. UDEREF/amd64, April 2010. http://grsecurity.net/pipermail/grsecurity/2010-April/001024.html.
-
(2010)
UDEREF/amd64
-
-
-
82
-
-
84945404178
-
-
February
-
PTS. Phoronix Test Suite, February 2014. http://www.phoronix-test-suite.com.
-
(2014)
Phoronix Test Suite
-
-
-
83
-
-
84903961742
-
-
September
-
RAMON DE CARVALHO VALLE & PACKET STORM. sock-sendpage() NULL pointer dereference (PPC/PPC64 exploit), September 2009. http://packetstormsecurity.org/files/81212/Linux-sock_sendpage-NULL-Pointer-Dereference.html.
-
(2009)
Sock-sendpage() NULL Pointer Dereference (PPC/PPC64 Exploit)
-
-
-
84
-
-
85077130189
-
Netmap: A novel framework for fast packet I/O
-
RIZZO, L. Netmap: A Novel Framework for Fast Packet I/O. In Proc. of USENIX ATC (2012), pp. 101-112.
-
(2012)
Proc. Of USENIX ATC
, pp. 101-112
-
-
Rizzo, L.1
-
85
-
-
85080721607
-
Owned over amateur radio: Remote kernel exploitation in 2011
-
ROSENBERG, D. Owned Over Amateur Radio: Remote Kernel Exploitation in 2011. In Proc. of DEF CON® (2011).
-
(2011)
Proc. Of DEF CON®
-
-
Rosenberg, D.1
-
87
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
SHACHAM, H. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proc. of CCS (2007), pp. 552-61.
-
(2007)
Proc. Of CCS
, pp. 552-561
-
-
Shacham, H.1
-
88
-
-
85080778068
-
Smashing the kernel stack for fun and profit
-
December
-
SINAN EREN. Smashing The Kernel Stack For Fun And Profit. Phrack 6, 60 (December 2002).
-
(2002)
Phrack
, vol.6
, Issue.60
-
-
Eren, S.1
-
91
-
-
84873114116
-
Attacking the core: Kernel exploiting notes
-
May
-
SQRKKYU, AND TWZI. Attacking the Core: Kernel Exploiting Notes. Phrack 6, 64 (May 2007).
-
(2007)
Phrack
, vol.6
, Issue.64
-
-
Sqrkkyu1
Twzi2
|