[PDF][PDF] Preventing Kernel Hacks with HAKCs.

DP McKee, Y Giannaris, C Ortega, HE Shrobe… - NDSS, 2022 - ndss-symposium.org
Commodity operating system kernels remain monolithic for practical and historical reasons.
All kernel code shares a single address space, executes with elevated processor privileges …

Rudra: finding memory safety bugs in rust at the ecosystem scale

Y Bae, Y Kim, A Askar, J Lim, T Kim - Proceedings of the ACM SIGOPS …, 2021 - dl.acm.org
Rust is a promising system programming language that guarantees memory safety at
compile time. To support diverse requirements for system software such as accessing low …

[PDF][PDF] Cross-Language Attacks.

S Mergendahl, N Burow, H Okhravi - NDSS, 2022 - ndss-symposium.org
Memory corruption attacks against unsafe programming languages like C/C++ have been a
major threat to computer systems for multiple decades. Various sanitizers and runtime …

{KSplit}: Automating device driver isolation

Y Huang, V Narayanan, D Detweiler, K Huang… - … USENIX Symposium on …, 2022 - usenix.org
Researchers have shown that recent CPU extensions support practical, low-overhead driver
isolation to protect kernels from defects and vulnerabilities in device drivers. With …

Practical program modularization with type-based dependence analysis

K Lu - 2023 IEEE Symposium on Security and Privacy (SP), 2023 - ieeexplore.ieee.org
Today's software programs are bloating and have become extremely complex. As there is
typically no internal isolation among modules in a program, a vulnerability can be exploited …

{PET}: Prevent discovered errors from being triggered in the linux kernel

Z Wang, Y Chen, Q Zeng - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The Linux kernel is the backbone of modern society. When a kernel error is discovered, a
quick remediation is needed. Whereas sanitizers greatly facilitate root cause diagnosis …

FlexOS: towards flexible OS isolation

H Lefeuvre, VA Bădoiu, A Jung… - Proceedings of the 27th …, 2022 - dl.acm.org
At design time, modern operating systems are locked in a specific safety and isolation
strategy that mixes one or more hardware/software protection mechanisms (eg user/kernel …

Kernel extension verification is untenable

J Jia, R Sahu, A Oswald, D Williams, MV Le… - Proceedings of the 19th …, 2023 - dl.acm.org
The emergence of verified eBPF bytecode is ushering in a new era of safe kernel
extensions. In this paper, we argue that eBPF's verifier---the source of its safety guarantees …

RULF: Rust library fuzzing via API dependency graph traversal

J Jiang, H Xu, Y Zhou - 2021 36th IEEE/ACM International …, 2021 - ieeexplore.ieee.org
Robustness is a key concern for Rust library development because Rust promises no risks
of undefined behaviors if developers use safe APIs only. Fuzzing is a practical approach for …

Linear types for large-scale systems verification

J Li, A Lattuada, Y Zhou, J Cameron, J Howell… - Proceedings of the …, 2022 - dl.acm.org
Reasoning about memory aliasing and mutation in software verification is a hard problem.
This is especially true for systems using SMT-based automated theorem provers. Memory …