Results 31 to 40 of about 78,918 (241)
Evaluating Code Coverage for Kernel Fuzzers via Function Call Graph
The OS kernel, which has full system privileges, is an attractive attack surface. A kernel fuzzer that targets system calls in fuzzing is a popular tool for discovering kernel bugs that can induce kernel privilege escalation attacks.
Mingi Cho +3 more
doaj +1 more source
Unikernels: the next stage of Linux’s dominance [PDF]
Unikernels have demonstrated enormous advantages over Linux in many important domains, causing some to propose that the days of Linux's dominance may be coming to an end.
Appavoo, Jonathan +8 more
core +1 more source
Approaches to determining the attack surface for fuzzing the Linux kernel [PDF]
The purpose of the study was to analyze possible methods for determining the attack surface in relation to solving the problem of fuzzing testing the kernel of operating systems of the Linux family and to select the most suitable one.
Teplyuk Pavel, Yakunin Aleksey
doaj +1 more source
Static verification for memory safety of Linux kernel drivers
Memory errors in Linux kernel drivers are a kind of serious bugs that can lead to dangerous consequences but such errors are hard to detect. This article describes static verification that aims at finding all errors under certain assumptions.
A. A. Vasilyev
doaj +1 more source
Linux XIA: an interoperable meta network architecture to crowdsource the future Internet [PDF]
With the growing number of proposed clean-slate redesigns of the Internet, the need for a medium that enables all stakeholders to participate in the realization, evaluation, and selection of these designs is increasing.
Byers, John +2 more
core +3 more sources
Configurable Toolset for Static Verification of Operating Systems Kernel Modules
An operating system (OS) kernel is a critical software regarding to reliability and efficiency. Quality of a modern OSs kernel is high enough. Another situation is with kernel modules, e.g.
I. S. Zakharov +5 more
doaj +1 more source
PrivGuard: Protecting Sensitive Kernel Data From Privilege Escalation Attacks
Kernels of operating systems are written in low-level unsafe languages, which make them inevitably vulnerable to memory corruption attacks. Most existing kernel defense mechanisms focus on preventing control-data attacks.
Weizhong Qiang +3 more
doaj +1 more source
Practical Enhancement of User Experience in NVMe SSDs
When processing I/O requests, the current Linux kernel does not adequately consider the urgency of user-centric tasks closely related to user experience.
Seongmin Kim +3 more
doaj +1 more source
E-BOOT: Preventing Boot-Time Entropy Starvation in Cloud Systems
Due to the impracticability of generating true randomness by running deterministic algorithms in computers, boot-loaders and operating systems undergo the lack of enough supplies of entropy at boot-time.
Fernando Vano-Garcia +1 more
doaj +1 more source
Multi-aspect, robust, and memory exclusive guest os fingerprinting [PDF]
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics.
Fu, Y, Gu, Y, Lin, Z, Prakash, A, Yin, H
core +1 more source

