메뉴 건너뛰기




Volumn , Issue , 2014, Pages 957-972

ret2dir: Rethinking kernel isolation

Author keywords

[No Author keywords available]

Indexed keywords

VIRTUAL ADDRESSES;

EID: 84939170403     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (111)

References (95)
  • 3
    • 85080638430 scopus 로고    scopus 로고
    • Binding the daemon: FreeBSD kernel stack and heap exploitation
    • ARGYROUDIS, P. Binding the Daemon: FreeBSD Kernel Stack and Heap Exploitation. In Black Hat USA (2010).
    • (2010) Black Hat USA
    • Argyroudis, P.1
  • 4
    • 85080788753 scopus 로고    scopus 로고
    • Tech. rep., Advanced RISC Machine (ARM), July
    • ARM® ARCHITECTURE REFERENCE MANUAL. ARM®v7-A and ARM®v7-R edition. Tech. rep., Advanced RISC Machine (ARM), July 2012.
    • (2012) ARM®v7-A and ARM®v7-R Edition
  • 6
    • 85084162449 scopus 로고
    • The slab allocator: An object-caching kernel memory allocator
    • BONWICK, J. The Slab Allocator: An Object-Caching Kernel Memory Allocator. In Proc. of USENIX Summer (1994), pp. 87-98.
    • (1994) Proc. Of USENIX Summer , pp. 87-98
    • Bonwick, J.1
  • 9
    • 84863145383 scopus 로고    scopus 로고
    • Linux kernel vulnerabilities: State-of-the-art defenses and open problems
    • CHEN, H., MAO, Y., WANG, X., ZHOU, D., ZELDOVICH, N., and KAASHOEK, M. F. Linux kernel vulnerabilities: State-of-the-art defenses and open problems. In Proc. of APsys (2011), pp. 51-55.
    • (2011) Proc. Of APsys , pp. 51-55
    • Chen, H.1    Mao, Y.2    Wang, X.3    Zhou, D.4    Zeldovich, N.5    Kaashoek, M.F.6
  • 10
    • 85080647848 scopus 로고    scopus 로고
    • March
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2005-0736, March 2005.
    • (2005) CVE-2005-0736
  • 11
    • 85080780329 scopus 로고    scopus 로고
    • May
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2009-1527, May 2009.
    • (2009) CVE-2009-1527
  • 12
    • 85080672894 scopus 로고    scopus 로고
    • August
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2009-2698, August 2009.
    • (2009) CVE-2009-2698
  • 13
    • 85080679547 scopus 로고    scopus 로고
    • August
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2009-3002, August 2009.
    • (2009) CVE-2009-3002
  • 14
    • 85080649979 scopus 로고    scopus 로고
    • September
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2009-3234, September 2009.
    • (2009) CVE-2009-3234
  • 15
    • 85080727108 scopus 로고    scopus 로고
    • October
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2009-3547, October 2009.
    • (2009) CVE-2009-3547
  • 16
    • 85080673075 scopus 로고    scopus 로고
    • August
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2010-2959, August 2010.
    • (2010) CVE-2010-2959
  • 17
    • 85019190995 scopus 로고    scopus 로고
    • September
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2010-3437, September 2010.
    • (2010) CVE-2010-3437
  • 18
    • 85080694362 scopus 로고    scopus 로고
    • October
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2010-3904, October 2010.
    • (2010) CVE-2010-3904
  • 19
    • 85080759298 scopus 로고    scopus 로고
    • October
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2010-4073, October 2010.
    • (2010) CVE-2010-4073
  • 20
    • 85080757671 scopus 로고    scopus 로고
    • November
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2010-4347, November 2010.
    • (2010) CVE-2010-4347
  • 21
    • 85080777184 scopus 로고    scopus 로고
    • February
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2012-0946, February 2012.
    • (2012) CVE-2012-0946
  • 22
    • 85080709607 scopus 로고    scopus 로고
    • December
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2013-0268, December 2013.
    • (2013) CVE-2013-0268
  • 23
    • 85080689656 scopus 로고    scopus 로고
    • February
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2013-1828, February 2013.
    • (2013) CVE-2013-1828
  • 24
    • 85009072862 scopus 로고    scopus 로고
    • February
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2013-2094, February 2013.
    • (2013) CVE-2013-2094
  • 25
    • 85080646267 scopus 로고    scopus 로고
    • April
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2013-2852, April 2013.
    • (2013) CVE-2013-2852
  • 26
    • 85080785104 scopus 로고    scopus 로고
    • August
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2013-2892, August 2013.
    • (2013) CVE-2013-2892
  • 27
    • 85080752016 scopus 로고    scopus 로고
    • June
    • COMMON VULNERABILITIES and EXPOSURES. CVE-2013-4343, June 2013.
    • (2013) CVE-2013-4343
  • 33
    • 78751539789 scopus 로고    scopus 로고
    • Heap taichi: Exploiting memory allocation granularity in heap-spraying attacks
    • DING, Y., WEI, T., WANG, T., LIANG, Z., and ZOU, W. Heap Taichi: Exploiting Memory Allocation Granularity in Heap-Spraying Attacks. In Proc. of ACSAC (2010), pp. 327-336.
    • (2010) Proc. Of ACSAC , pp. 327-336
    • Ding, Y.1    Wei, T.2    Wang, T.3    Liang, Z.4    Zou, W.5
  • 34
    • 85080679253 scopus 로고    scopus 로고
    • Use Linux, BSD., November
    • DISTROWATCH. Put the fun back into computing. Use Linux, BSD., November 2013. http://distrowatch.com.
    • (2013) Put the Fun Back into Computing
  • 36
    • 85080707234 scopus 로고    scopus 로고
    • December
    • EXPLOIT DATABASE. EBD-131, December 2003.
    • (2003) EBD-131
  • 37
    • 85080642388 scopus 로고    scopus 로고
    • September
    • EXPLOIT DATABASE. EBD-16835, September 2009.
    • (2009) EBD-16835
  • 38
    • 85080749293 scopus 로고    scopus 로고
    • August
    • EXPLOIT DATABASE. EBD-14814, August 2010.
    • (2010) EBD-14814
  • 39
    • 85080728189 scopus 로고    scopus 로고
    • September
    • EXPLOIT DATABASE. EBD-15150, September 2010.
    • (2010) EBD-15150
  • 40
    • 85080750679 scopus 로고    scopus 로고
    • October
    • EXPLOIT DATABASE. EBD-15285, October 2010.
    • (2010) EBD-15285
  • 41
    • 85080780706 scopus 로고    scopus 로고
    • January
    • EXPLOIT DATABASE. EBD-15916, January 2011.
    • (2011) EBD-15916
  • 42
    • 85080638270 scopus 로고    scopus 로고
    • June
    • EXPLOIT DATABASE. EBD-17391, June 2011.
    • (2011) EBD-17391
  • 43
    • 85080772165 scopus 로고    scopus 로고
    • September
    • EXPLOIT DATABASE. EBD-17787, September 2011.
    • (2011) EBD-17787
  • 44
    • 85080674522 scopus 로고    scopus 로고
    • August
    • EXPLOIT DATABASE. EBD-20201, August 2012.
    • (2012) EBD-20201
  • 45
    • 85080699375 scopus 로고    scopus 로고
    • February
    • EXPLOIT DATABASE. EBD-24555, February 2013.
    • (2013) EBD-24555
  • 47
    • 85080730794 scopus 로고    scopus 로고
    • November
    • GOOGLE. Android, November 2013. http://www.android.com.
    • (2013)
  • 48
    • 85080722301 scopus 로고    scopus 로고
    • November
    • GOOGLE. Chromium OS, November 2013. http://www.chromium.org/chromium-os.
    • (2013)
  • 49
    • 0024089972 scopus 로고
    • The confused deputy: (or why capabilities might have been invented)
    • October
    • HARDY, N. The Confused Deputy: (or why capabilities might have been invented). SIGOPS Oper. Syst. Rev. 22 (October 1988), 36-38.
    • (1988) SIGOPS Oper. Syst. Rev. , vol.22 , pp. 36-38
    • Hardy, N.1
  • 51
    • 85029681162 scopus 로고    scopus 로고
    • Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
    • HUND, R., HOLZ, T., and FREILING, F. C. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. In Proc. ofUSENIXSec (2009), pp. 384-398.
    • (2009) Proc. OfUSENIXSec , pp. 384-398
    • Hund, R.1    Holz, T.2    Freiling, F.C.3
  • 52
    • 38349068551 scopus 로고    scopus 로고
    • Singularity: Rethinking the software stack
    • April
    • HUNT, G. C, and LARUS, J. R. Singularity: Rethinking the Software Stack. SIGOPS Oper. Syst. Rev. 41, 2 (April 2007), 37-49.
    • (2007) SIGOPS Oper. Syst. Rev. , vol.41 , Issue.2 , pp. 37-49
    • Hunt, G.C.1    Larus, J.R.2
  • 54
    • 84945176559 scopus 로고    scopus 로고
    • Tech. rep., Intel Corporation, January
    • INTEL® 64 AND IA-32 ARCHITECTURES SOFTWARE DEVELOPER'S MANUAL. Instruction Set Extensions Programming Reference. Tech. rep., Intel Corporation, January 2013.
    • (2013) Instruction Set Extensions Programming Reference
  • 55
    • 85080669280 scopus 로고    scopus 로고
    • Tech. rep., Intel Corporation, September
    • INTEL® 64 AND IA-32 ARCHITECTURES SOFTWARE DEVELOPER'S MANUAL. System Programming Guide, Part 1. Tech. rep., Intel Corporation, September 2013.
    • (2013) System Programming Guide, Part 1
  • 56
    • 84878345548 scopus 로고    scopus 로고
    • Memento: Learning secrets from process footprints
    • JANA, S., and SHMATIKOV, V. Memento: Learning Secrets from Process Footprints. In Proc. of IEEE S & P (2012), pp. 143-157.
    • (2012) Proc. Of IEEE S & P , pp. 143-157
    • Jana, S.1    Shmatikov, V.2
  • 57
    • 85030776494 scopus 로고    scopus 로고
    • kGuard: Lightweight kernel protection against return-to-user attacks
    • KEMERLIS, V. P., PORTOKALIDIS, G., and KEROMYTIS, A. D. kGuard: Lightweight Kernel Protection against Return-to-user Attacks. In Proc. of USENIX Sec (2012), pp. 459-474.
    • (2012) Proc. Of USENIX Sec , pp. 459-474
    • Kemerlis, V.P.1    Portokalidis, G.2    Keromytis, A.D.3
  • 61
    • 0000082224 scopus 로고
    • A fast storage allocator
    • October
    • KNOWLTON, K. C. A fast storage allocator. Commun. ACM 8, 10 (October 1965), 623-624.
    • (1965) Commun. ACM , vol.8 , Issue.10 , pp. 623-624
    • Knowlton, K.C.1
  • 62
    • 84976855523 scopus 로고
    • Architecture support for single address space operating systems
    • KOLDINGER, E. J., and CHASE., J. S., and EGGERS, S. J. Architecture Support for Single Address Space Operating Systems. In Proc. ofASPLOS (1992), pp. 175-186.
    • (1992) Proc. OfASPLOS , pp. 175-186
    • Koldinger, E.J.1    Chase, J.S.2    Eggers, S.J.3
  • 66
    • 85080731382 scopus 로고
    • On jU-kernel construction
    • LIEDTKE, J. On jU-Kernel Construction. In Proc. of SOSP (1984), pp. 237-250.
    • (1984) Proc. Of SOSP , pp. 237-250
    • Liedtke, J.1
  • 72
    • 84909595937 scopus 로고    scopus 로고
    • November
    • MOZILLA. Firefox OS, November 2013. https://www.mozilla.org/en-US/firefox/os/.
    • (2013) Firefox OS
  • 73
    • 85080688044 scopus 로고    scopus 로고
    • November
    • NATIONAL VULNERABILITY DATABASE. Kernel Vulnerabilities, November 2013. http://goo.gl/GJpw0b.
    • (2013) Kernel Vulnerabilities
  • 75
    • 84924652861 scopus 로고    scopus 로고
    • November
    • OFFENSIVE SECURITY. The Exploit Database, November 2013. http://www.exploit-db.com.
    • (2013) The Exploit Database
  • 77
    • 85080786111 scopus 로고    scopus 로고
    • November
    • PAX. Homepage of The PaX Team, November 2013. http://pax.grsecurity.net.
    • (2013) Homepage of the PaX Team
  • 78
    • 85061234965 scopus 로고    scopus 로고
    • April
    • PAX TEAM. UDEREF/i386, April 2007. http://grsecurity.net/~spender/uderef.txt.
    • (2007) UDEREF/i386
  • 79
    • 85019251939 scopus 로고    scopus 로고
    • April
    • PAX TEAM. UDEREF/amd64, April 2010. http://grsecurity.net/pipermail/grsecurity/2010-April/001024.html.
    • (2010) UDEREF/amd64
  • 82
    • 84945404178 scopus 로고    scopus 로고
    • February
    • PTS. Phoronix Test Suite, February 2014. http://www.phoronix-test-suite.com.
    • (2014) Phoronix Test Suite
  • 83
  • 84
    • 85077130189 scopus 로고    scopus 로고
    • Netmap: A novel framework for fast packet I/O
    • RIZZO, L. Netmap: A Novel Framework for Fast Packet I/O. In Proc. of USENIX ATC (2012), pp. 101-112.
    • (2012) Proc. Of USENIX ATC , pp. 101-112
    • Rizzo, L.1
  • 85
    • 85080721607 scopus 로고    scopus 로고
    • Owned over amateur radio: Remote kernel exploitation in 2011
    • ROSENBERG, D. Owned Over Amateur Radio: Remote Kernel Exploitation in 2011. In Proc. of DEF CON® (2011).
    • (2011) Proc. Of DEF CON®
    • Rosenberg, D.1
  • 87
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • SHACHAM, H. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proc. of CCS (2007), pp. 552-61.
    • (2007) Proc. Of CCS , pp. 552-561
    • Shacham, H.1
  • 88
    • 85080778068 scopus 로고    scopus 로고
    • Smashing the kernel stack for fun and profit
    • December
    • SINAN EREN. Smashing The Kernel Stack For Fun And Profit. Phrack 6, 60 (December 2002).
    • (2002) Phrack , vol.6 , Issue.60
    • Eren, S.1
  • 91
    • 84873114116 scopus 로고    scopus 로고
    • Attacking the core: Kernel exploiting notes
    • May
    • SQRKKYU, AND TWZI. Attacking the Core: Kernel Exploiting Notes. Phrack 6, 64 (May 2007).
    • (2007) Phrack , vol.6 , Issue.64
    • Sqrkkyu1    Twzi2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.