최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Software: practice & experience, v.48 no.12, 2018년, pp.2237 - 2256
Reshetova, Elena (Intel OTC, Espoo, Finland) , Liljestrand, Hans (Aalto University, Espoo, Finland) , Paverd, Andrew (Aalto University, Espoo, Finland) , Asokan, N. (Aalto University, Espoo, Finland)
SummaryThe security of billions of devices worldwide depends on the security and robustness of the mainline Linux kernel. However, the increasing number of kernel‐specific vulnerabilities, especially memory safety vulnerabilities, shows that the kernel is a popular and practically exploitable ...
Smalley S , Vance C , Salamon W . Implementing SELinux as a Linux Security Module . 2006 . https://www.nsa.gov/resources/everyone/digital-media-center/publications/research-papers/assets/files/implementing-selinux-as-linux-security-module-report.pdf
Bauer M . Paranoid penguin: an introduction to Novell AppArmor . Linux J . 2006 ; 2006 ( 148 ): 13 .
Integrity Measurement Architecture (IMA) wiki pages. 2017 . http://sourceforge.net/p/linux-ima/wiki/Home/
Implementing dm‐verity . 2017 . http://source.android.com/security/verifiedboot/dm-verity
National Vulnerability Database: Statistics for kernel vulnerabilities . 2017 . https://nvd.nist.gov/vuln/search/statistics?adv_search=true&form_type=advanced∓results_type=statistics&query=kernel
Cook K . Status of the Kernel Self Protection Project . 2016 . www.outflux.net/slides/2016/lss/kspp.pdf
Kernel Self Protection Project wiki. 2017 . http://www.kernsec.org/wiki/index.php/Kernel_Self_Protection_Project
Raheja S , Munjal G , Shagun . Analysis of Linux kernel vulnerabilities . Indian J Sci Technol . 2016 ; 9 ( 48 ).
Chen H , Mao Y , Wang X , Zhou D , Zeldovich N , Kaashoek MF . Linux kernel vulnerabilities: state‐of‐the‐art defenses and open problems . In: Proceedings of the Second Asia‐Pacific Workshop on Systems (APSys); 2011 ; Shanghai, China .
Collins GE . A method for overlapping and erasure of lists . Commun ACM . 1960 ; 3 ( 12 ): 655 ‐ 657 .
McKenney PE . Overview of Linux‐kernel reference counting . Technical Report n2167=07‐0027. Beaverton, OR : IBM Linux Technology Center ; 2007 .
Nagarakatte S , Zhao J , Martin MMK , Zdancewic S . Softbound: highly compatible and complete spatial memory safety for C . In: Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation; 2009 ; Dublin, Ireland .
Moreira J , Rigo S , Polychronakis M , Kemerlis V . DROP THE ROP: Fine‐grained Control‐flow Integrity for the Linux Kernel . 2017 . https://www.blackhat.com/docs/asia-17/materials/asia-17-Moreira-Drop-The-Rop-Fine-Grained-Control-Flow-Integrity-For-The-Linux-Kernel-wp.pdf
Song C , Lee B , Lu K , Harris W , Kim T , Lee W . Enforcing kernel security invariants with data flow integrity . Paper presented: 23rd Annual Network Annual Network and Distributed System Security Symposium (NDSS); San Diego, CA . 2016 .
The Kernel Address Sanitizer (KASAN) . 2017 . www.kernel.org/doc/html/v4.10/dev-tools/kasan.html
Nikolenko V . Exploiting COF Vulnerabilities in the Linux kernel . 2016 . ruxcon.org.au/assets/2016/slides/ruxcon2016-Vitaly.pdf
Ramakesavan R , Zimmerman D , Singaravelu P . Intel Memory Protection Extensions (Intel MPX) Enabling Guide . 2015 . http://caxapa.ru/thumbs/808589/4878c6471cb5ae28546a594bf25ba5c25c6f.pdf
Hastings R , Joyce B . Purify: fast detection of memory leaks and access errors . In: Proceedings of the Winter 1992 USENIX Conference; 1991 ; Berkeley, CA .
Patil H , Fischer CN . Efficient run‐time monitoring using shadow processing . In: Proceedings of the Second International Workshop on Automated Debugging (AADEBUG); 1995 ; Saint Malo, France .
Patil H , Fischer C . Low‐cost, concurrent checking of pointer and array accesses in C programs . Softw Pract Exper . 1997 ; 27 ( 1 ): 87 ‐ 110 .
Jones RWM , Kelly PHJ . Backwards‐compatible bounds checking for arrays and pointers in C programs . In: Proceedings of the Third International Workshop on Automated Debugging (AADEBUG); 1997 ; Linköping, Sweden .
Yong SH , Horwitz S . Protecting C programs from attacks via invalid pointer dereferences . ACM SIGSOFT Softw Eng Notes . 2003 ; 28 ( 5 ): 307 ‐ 316 .
Xu W , DuVarney DC , Sekar R . An efficient and backwards‐compatible transformation to ensure memory safety of C programs . SIGSOFT Softw Eng Notes . 2004 ; 29 ( 6 ): 117 ‐ 126 .
Nethercote N , Fitzhardinge J . Bounds‐checking entire programs without recompiling . In: Proceedings of the Second Workshop on Semantics Program Analysis and Computing Environments for Memory Management (SPACE); 2004 ; Venice, Italy .
Dhurjati D , Adve V . Backwards‐compatible array bounds checking for C with very low overhead . In: Proceedings of the 28th International Conference on Software Engineering; 2006 ; Shanghai, China .
Necula GC , McPeak S , Weimer W . CCured: type‐safe retrofitting of legacy code . ACM SIGPLAN Notices . 2002 ; 37 ( 1 ): 128 ‐ 139 .
Grossman D , Hicks M , Jim T , Morrisett G . Cyclone: a type‐safe dialect of C . C/C++ Users J . 2005 ; 23 ( 1 ): 112 ‐ 139 .
PaX address space layout randomization (ASLR) . 2003 . http://pax.grsecurity.net/docs/aslr.txt
Branco R . Grsecurity forum — Guest Blog by Rodrigo Branco: PAX_REFCOUNT Documentation . 2015 . https://forums.grsecurity.net/viewtopic.php?f=7Zt=4173
Nethercote N , Seward J . Valgrind: a framework for heavyweight dynamic binary instrumentation . In: Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation; 2007 ; San Diego, CA .
Serebryany K , Bruening D , Potapenko A , Vyukov D . AddressSanitizer: a fast address sanity checker . In: USENIX Annual Technical Conference; 2012 ; Boston, MA .
Solar Designer . Linux kernel patch to remove stack exec permission . 1997 . http://seclists.org/bugtraq/1997/Apr/31
Pax non‐executable pages design & implementation . 2003 . http://pax.grsecurity.net
Krahmer S . X86‐64 buffer overflow exploits and the borrowed code chunks exploitation technique . 2005 . https://trailofbits.github.io/ctf/exploits/references/no-nx.pdf
Cowan C , Pu C , Maier D , et al. StackGuard: automatic adaptive detection and prevention of buffer‐overflow attacks . In: Proceedings of the 7th USENIX Security Symposium; 1998 ; San Antonio, TX .
A stack smashing technique protection tool for Linux . 2011 . http://www.angelfire.com/sk/stackshield
Xu J , Kalbarczyk Z , Iyer RK . Transparent runtime randomization for security . Paper presented at: 22nd Symposium on Reliable Distributed Systems (SRDS); 2003 ; Florence, Italy .
Ratanaworabhan P , Livshits B , Zorn B . NOZZLE: a defense against heap‐spraying code injection attacks . Paper presented at: 18th USENIX Security Symposium; 2009 ; San Jose, CA .
Kwon A , Dhawan U , Smith J , Knight Jr TF , DeHon A . Low‐fat pointers: compact encoding and efficient gate‐level implementation of fat pointers for spatial safety and capability‐based security . In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS); 2013 ; Berlin, Germany .
Kuvaiskii D , Oleksenko O , Arnautov S , et al. SGXBOUNDS: memory safety for shielded execution . In: Proceedings of the Twelfth European Conference on Computer Systems (EuroSys); 2017 ; Belgrade, Serbia .
Devietti J , Blundell C , Martin MMK , Zdancewic S . Hardbound: architectural support for spatial safety of the C programming language . ACM SIGARCH Comput Archit News . 2008 ; 36 ( 1 ): 103 ‐ 114 .
Coccinelle Project . 2017 . http://coccinelle.lip6.fr/
Pike JP . Server CPU Predictions For 2017 . 2017 . https://www.forbes.com/sites/moorinsights/2017/01/10/server-cpu-predictions-for-2017/27adb50365a7
Akritidis P , Costa M , Castro M , Hand S . Baggy bounds checking: an efficient and backwards‐compatible defense against out‐of‐bounds errors . Paper presented at: 18th USENIX Security Symposium; 2009 ; San Jose, CA .
Netperf Project . 2017 . http://hewlettpackard.github.io/netperf
Grsecurity Project . 2017 . https://grsecurity.net
Submitting patches: the essential guide to getting your code into the kernel . 2017 . https://www.kernel.org/doc/html/v4.12/process/submitting-patches.html
Cook K . codeblog: security things in Linux v4.13 . 2017 . https://outflux.net/blog/archives/2017/09/05/security-things-in-linux-v4-13/
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
저자가 공개 리포지터리에 출판본, post-print, 또는 pre-print를 셀프 아카이빙 하여 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.