2011
DOI: 10.1016/j.cose.2011.09.003
|View full text |Cite
|
Sign up to set email alerts
|

Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification

Abstract: Motivated by the goal of hardening operating system kernels against rootkits and related malware, we survey the common interfaces and methods which can be used to modify (either legitimately or maliciously) the kernel which is run on a commodity desktop computer. We also survey how these interfaces can be restricted or disabled. While we concentrate mainly on Linux, many of the methods for modifying kernel code also exist on other operating systems, some of which are discussed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 22 publications
0
0
0
Order By: Relevance