Results 1 to 10 of about 78,899 (223)

Fractal Weyl law for Linux Kernel Architecture [PDF]

open access: greenThe European Physical Journal B, 2010
We study the properties of spectrum and eigenstates of the Google matrix of a directed network formed by the procedure calls in the Linux Kernel. Our results obtained for various versions of the Linux Kernel show that the spectrum is characterized by the
A. D. Chepelianskii   +29 more
core   +7 more sources

Hijacking the Linux Kernel [PDF]

open access: yes, 2011
In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a different function.
Drahansky, Martin   +2 more
core   +4 more sources

Enabling Attribute-Based Access Control in Linux Kernel. [PDF]

open access: greenAsia CCS 22 (2022), 2022
Sai Varshith HO   +3 more
europepmc   +3 more sources

Linux Kernel Vulnerabilities: State-of-the-Art Defenses and Open Problems [PDF]

open access: yesProceedings of the Second Asia-Pacific Workshop on Systems, 2011
Avoiding kernel vulnerabilities is critical to achieving security of many systems, because the kernel is often part of the trusted computing base.
Chen, Haogang   +5 more
core   +5 more sources

Linux kernel compaction through cold code swapping [PDF]

open access: yes, 2009
There is a growing trend to use general-purpose operating systems like Linux in embedded systems. Previous research focused on using compaction and specialization techniques to adapt a general-purpose OS to the memory-constrained environment, presented ...
A. Milanova   +13 more
core   +4 more sources

Rusty Linux: Advances in Rust for Linux Kernel Development [PDF]

open access: greenProceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement
This paper has been accepted for publication and presentation at ESEM 2024 Emerging Results, Vision and Reflection Papers Track to be held in Barcelona, Spain on October 24-25 ...
Shane K. Panter, Nasir U. Eisty
openalex   +3 more sources

The Real-Time Linux Kernel

open access: greenACM Computing Surveys, 2019
The increasing functional and nonfunctional requirements of real-time applications, the advent of mixed criticality computing, and the necessity of reducing costs are leading to an increase in the interest for employing COTS hardware in real-time domains. In this scenario, the Linux kernel is emerging as a valuable solution on the software side, thanks
Federico Reghenzani   +2 more
  +6 more sources

Assessing the Cloud-RAN in the Linux Kernel: Sharing Computing and Network Resources [PDF]

open access: yesSensors
Cloud-based Radio Access Network (Cloud-RAN) leverages virtualization to enable the coexistence of multiple virtual Base Band Units (vBBUs) with collocated workloads on a single edge computer, aiming for economic and operational efficiency. However, this
Andres F. Ocampo   +3 more
doaj   +2 more sources

Practical Safe Linux Kernel Extensibility [PDF]

open access: goldProceedings of the Workshop on Hot Topics in Operating Systems, 2019
The ability to extend kernel functionality safely has long been a design goal for operating systems. Modern operating systems, such as Linux, are structured for extensibility to enable sharing a single code base among many environments. Unfortunately, safety has lagged behind, and bugs in kernel extensions continue to cause problems.
Samantha Miller   +5 more
openalex   +2 more sources

Analysis of Linux Kernel Vulnerabilities

open access: diamondIndian Journal of Science and Technology, 2016
Objective: This paper aims to analyze the top ten vulnerabilities present in the Linux kernel and to classify them into different classes based on security metrics. Methods/Statistical Analysis: Comparative evaluation of different tree based, Bayesian and instance based classifiers w.r.t.
Supriya Raheja, Geetika Munjal, Shagun
openalex   +3 more sources

Home - About - Disclaimer - Privacy