2019
DOI: 10.1007/978-3-030-34339-2_5
|View full text |Cite
|
Sign up to set email alerts
|

KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(13 citation statements)
references
References 30 publications
0
13
0
Order By: Relevance
“…Finally, this paper highlights the contribution differences from the previous paper in [16]. Although this paper is based on conference proceedings in [7], [16], the present paper provides additional design, evaluation results, and implementation portability. Additionally, this paper introduced the general concept of MKM that can mitigate the memory corruption for running kernel and actual kernel vulnerability attacks that cannot break the security capability of MKM in [16].…”
Section: Introductionmentioning
confidence: 88%
See 4 more Smart Citations
“…Finally, this paper highlights the contribution differences from the previous paper in [16]. Although this paper is based on conference proceedings in [7], [16], the present paper provides additional design, evaluation results, and implementation portability. Additionally, this paper introduced the general concept of MKM that can mitigate the memory corruption for running kernel and actual kernel vulnerability attacks that cannot break the security capability of MKM in [16].…”
Section: Introductionmentioning
confidence: 88%
“…Moreover, MKM has additional overheads when switching between the trampoline and security kernel page tables in kernel mode. The kernel observation mechanism requires additional overhead time of approximately 0.002 µs to 8.246 µs for each system call invocation in [7].…”
Section: B Performancementioning
confidence: 99%
See 3 more Smart Citations