[PDF][PDF] Preventing Kernel Hacks with HAKCs.

DP McKee, Y Giannaris, C Ortega, HE Shrobe… - NDSS, 2022 - ndss-symposium.org
Commodity operating system kernels remain monolithic for practical and historical reasons.
All kernel code shares a single address space, executes with elevated processor privileges …

{RedLeaf}: isolation and communication in a safe operating system

V Narayanan, T Huang, D Detweiler, D Appel… - … USENIX Symposium on …, 2020 - usenix.org
RedLeaf is a new operating system developed from scratch in Rust to explore the impact of
language safety on operating system organization. In contrast to commodity systems …

Abslearn: a gnn-based framework for aliasing and buffer-size information retrieval

K Liang, J Tan, D Zeng, Y Huang, X Huang… - Pattern Analysis and …, 2023 - Springer
Inferring aliasing and buffer-size information is important to understanding a C program's
memory layout, which is critical to program analysis and security-related tasks. However …

{KSplit}: Automating device driver isolation

Y Huang, V Narayanan, D Detweiler, K Huang… - … USENIX Symposium on …, 2022 - usenix.org
Researchers have shown that recent CPU extensions support practical, low-overhead driver
isolation to protect kernels from defects and vulnerabilities in device drivers. With …

Practical program modularization with type-based dependence analysis

K Lu - 2023 IEEE Symposium on Security and Privacy (SP), 2023 - ieeexplore.ieee.org
Today's software programs are bloating and have become extremely complex. As there is
typically no internal isolation among modules in a program, a vulnerability can be exploited …

A hybrid alias analysis and its application to global variable protection in the linux kernel

G Li, H Zhang, J Zhou, W Shen, Y Sui… - 32nd USENIX Security …, 2023 - usenix.org
Global variables in the Linux kernel have been a common target of memory corruption
attacks to achieve privilege escalation. Several potential defense mechanisms can be …

Ec: Embedded systems compartmentalization via intra-kernel isolation

A Khan, D Xu, DJ Tian - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
Embedded systems comprise of low-power microcontrollers and constitute computing
systems from IoT nodes to supercomputers. Unfortunately, due to the low power constraint …

On-demand-fork: A microsecond fork for memory-intensive and latency-sensitive applications

K Zhao, S Gong, P Fonseca - … of the Sixteenth European Conference on …, 2021 - dl.acm.org
Fork has long been the process creation system call for Unix. At its inception, fork was hailed
as an efficient system call due to its use of copy-on-write on memory shared between parent …

Vdom: Fast and unlimited virtual domains on multiple architectures

Z Yuan, S Hong, R Chang, Y Zhou, W Shen… - Proceedings of the 28th …, 2023 - dl.acm.org
Hardware memory domain primitives, such as Intel MPK and ARM Memory Domain, have
been used for efficient in-process memory isolation. However, they can only provide a …

μscope: A methodology for analyzing least-privilege compartmentalization in large software artifacts

N Roessler, L Atayde, I Palmer, D McKee… - Proceedings of the 24th …, 2021 - dl.acm.org
By prioritizing simplicity and portability, least-privilege engineering has been an afterthought
in OS design, resulting in monolithic kernels where any exploit leads to total compromise …