Results 1 to 10 of about 78,899 (223)
Fractal Weyl law for Linux Kernel Architecture [PDF]
We study the properties of spectrum and eigenstates of the Google matrix of a directed network formed by the procedure calls in the Linux Kernel. Our results obtained for various versions of the Linux Kernel show that the spectrum is characterized by the
A. D. Chepelianskii +29 more
core +7 more sources
Hijacking the Linux Kernel [PDF]
In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a different function.
Drahansky, Martin +2 more
core +4 more sources
Enabling Attribute-Based Access Control in Linux Kernel. [PDF]
Sai Varshith HO +3 more
europepmc +3 more sources
Linux Kernel Vulnerabilities: State-of-the-Art Defenses and Open Problems [PDF]
Avoiding kernel vulnerabilities is critical to achieving security of many systems, because the kernel is often part of the trusted computing base.
Chen, Haogang +5 more
core +5 more sources
Linux kernel compaction through cold code swapping [PDF]
There is a growing trend to use general-purpose operating systems like Linux in embedded systems. Previous research focused on using compaction and specialization techniques to adapt a general-purpose OS to the memory-constrained environment, presented ...
A. Milanova +13 more
core +4 more sources
Rusty Linux: Advances in Rust for Linux Kernel Development [PDF]
This paper has been accepted for publication and presentation at ESEM 2024 Emerging Results, Vision and Reflection Papers Track to be held in Barcelona, Spain on October 24-25 ...
Shane K. Panter, Nasir U. Eisty
openalex +3 more sources
The increasing functional and nonfunctional requirements of real-time applications, the advent of mixed criticality computing, and the necessity of reducing costs are leading to an increase in the interest for employing COTS hardware in real-time domains. In this scenario, the Linux kernel is emerging as a valuable solution on the software side, thanks
Federico Reghenzani +2 more
+6 more sources
Assessing the Cloud-RAN in the Linux Kernel: Sharing Computing and Network Resources [PDF]
Cloud-based Radio Access Network (Cloud-RAN) leverages virtualization to enable the coexistence of multiple virtual Base Band Units (vBBUs) with collocated workloads on a single edge computer, aiming for economic and operational efficiency. However, this
Andres F. Ocampo +3 more
doaj +2 more sources
Practical Safe Linux Kernel Extensibility [PDF]
The ability to extend kernel functionality safely has long been a design goal for operating systems. Modern operating systems, such as Linux, are structured for extensibility to enable sharing a single code base among many environments. Unfortunately, safety has lagged behind, and bugs in kernel extensions continue to cause problems.
Samantha Miller +5 more
openalex +2 more sources
Analysis of Linux Kernel Vulnerabilities
Objective: This paper aims to analyze the top ten vulnerabilities present in the Linux kernel and to classify them into different classes based on security metrics. Methods/Statistical Analysis: Comparative evaluation of different tree based, Bayesian and instance based classifiers w.r.t.
Supriya Raheja, Geetika Munjal, Shagun
openalex +3 more sources

