“…In this paper, we do not provide a complete overview of all hardware which may allow write access to kernel code, but do note that technologies such as direct memory access (or bus mastering) [10,33], FireWire [28], and ACPI [32] may provide mechanisms for updating physical memory. Because the kernel mediates access to the underlying hardware, applications wishing to make use of hardware in modifying the kernel must request such access through the kernel.…”
Section: Hardware Interfaces To Kernel Memorymentioning
Motivated by the goal of hardening operating system kernels against rootkits and related malware, we survey the common interfaces and methods which can be used to modify (either legitimately or maliciously) the kernel which is run on a commodity desktop computer. We also survey how these interfaces can be restricted or disabled. While we concentrate mainly on Linux, many of the methods for modifying kernel code also exist on other operating systems, some of which are discussed.
“…In this paper, we do not provide a complete overview of all hardware which may allow write access to kernel code, but do note that technologies such as direct memory access (or bus mastering) [10,33], FireWire [28], and ACPI [32] may provide mechanisms for updating physical memory. Because the kernel mediates access to the underlying hardware, applications wishing to make use of hardware in modifying the kernel must request such access through the kernel.…”
Section: Hardware Interfaces To Kernel Memorymentioning
Motivated by the goal of hardening operating system kernels against rootkits and related malware, we survey the common interfaces and methods which can be used to modify (either legitimately or maliciously) the kernel which is run on a commodity desktop computer. We also survey how these interfaces can be restricted or disabled. While we concentrate mainly on Linux, many of the methods for modifying kernel code also exist on other operating systems, some of which are discussed.
“…Only 5000 additions or subtractions were performed per second (Baer, 1980). Inherited from previous electromechanical devices, this primitive hardware determined that there was no corresponding programming in the sense we give today.…”
Section: Relationship Between Software and Hardwarementioning
confidence: 99%
“…With the developments in batch processing, high level programming and independent transaction, the user was isolated from the machine. Debugging was off-line (Baer, 1980). The first generation marked the beginning of the comprehensive system which was due to the rise of a number of contradictions between software and hardware.…”
Section: The Genetic Changes Of Hardware and Softwarementioning
Abstract. The paper presents a Chinese philosophical point of view of AI, and presents a novel system of the AI machine. There are two basic relations or contradictions which drive computer developments forward. One is between software and hardware and the other is between data structure and system organization. It is suggested that a description of a future AI system should primarily start from these contradictions.
“…Various prescriptions have been made as to what this term means or should mean [2,12,17]. The following characterization offers no startling new insight on this matter; we merely attempt to unify these different definitions in the context of the social practice of architectural design and research.…”
In a previous paper [8], we had presented the notion of a family of languages for the multilevel design and description of computer architectures. Details of a particular language family, currently under development, was also described. One of the constituent members of this family is S~, intended for the specifications of the outer (or exo-) and inner (or endo-) architectures of general purpose von Neumann style computers. In this paper ~e describe the formalization and application of SA to the formal proofs 9J_correctness of architecture designs.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.