- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
0001000002000000
- More
- Availability
-
30
- Author / Contributor
- Filter by Author / Creator
-
-
Spall, Sarah (3)
-
Tobin-Hochstadt, Sam (2)
-
Balasubramanian, Abhiram (1)
-
Bauer, Scott (1)
-
Bhattacharyya, Moinak (1)
-
Burtsev, Anton (1)
-
Derici, Caner (1)
-
Dybvig, R. Kent (1)
-
Flatt, Matthew (1)
-
Hussain, Aftab (1)
-
Jacobsen, Charlie (1)
-
Keep, Andrew W. (1)
-
Massaccesi, Gustavo E. (1)
-
Mitchell, Neil (1)
-
Narayanan, Vikram (1)
-
Quigley, Michael (1)
-
Shen, Junjie (1)
-
Younis, Abdullah (1)
-
Zeppieri, Jon (1)
-
#Tyler Phillips, Kenneth E. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Flatt, Matthew; Derici, Caner; Dybvig, R. Kent; Keep, Andrew W.; Massaccesi, Gustavo E.; Spall, Sarah; Tobin-Hochstadt, Sam; Zeppieri, Jon (, Proceedings of the ACM on Programming Languages)
-
Narayanan, Vikram; Balasubramanian, Abhiram; Jacobsen, Charlie; Spall, Sarah; Bauer, Scott; Quigley, Michael; Hussain, Aftab; Younis, Abdullah; Shen, Junjie; Bhattacharyya, Moinak; et al (, Proceedings of the USENIX Conference)Modern operating systems are monolithic. Today, however, lack of isolation is one of the main factors undermining security of the kernel. Inherent complexity of the kernel code and rapid development pace combined with the use of unsafe, low-level programming language results in a steady stream of errors. Even after decades of efforts to make commodity kernels more secure, i.e., development of numerous static and dynamic approaches aimed to prevent exploitation of most common errors, several hundreds of serious kernel vulnerabilities are reported every year. Unfortunately, in a monolithic kernel a single exploitable vulnerability potentially provides an attacker with access to the entire kernel.Modern kernels need isolation as a practical means of confining the effects of exploits to individual kernel subsystems. Historically, introducing isolation in the kernel is hard. First, commodity hardware interfaces provide no support for efficient, fine-grained isolation. Second, the complexity of a modern kernel prevents a naive decomposition effort. Our work on Lightweight Execution Domains (LXDs) takes a step towards enabling isolation in a full-featured operating system kernel. LXDs allow one to take an existing kernel subsystem and run it inside an isolated domain with minimal or no modifications and with a minimal overhead. We evaluate our approach by developing isolated versions of several performance-critical device drivers in the Linux kernel.more » « less
An official website of the United States government

Full Text Available