Tolerating hardware device failures in software

A Kadav, MJ Renzelmann, MM Swift - Proceedings of the ACM SIGOPS …, 2009 - dl.acm.org
Hardware devices can fail, but many drivers assume they do not. When confronted with real
devices that misbehave, these assumptions can lead to driver or system failures. While …

Defending against malicious peripherals with Cinch

S Angel, RS Wahby, M Howald, JB Leners… - 25th USENIX Security …, 2016 - usenix.org
Malicious peripherals designed to attack their host computers are a growing problem.
Inexpensive and powerful peripherals that attach to plug-and-play buses have made such …

I/O paravirtualization at the device file boundary

A Amiri Sani, K Boos, S Qin, L Zhong - ACM SIGARCH Computer …, 2014 - dl.acm.org
Paravirtualization is an important I/O virtualization technology since it uniquely provides all
of the following benefits: the ability to share the device between multiple VMs, support for …

Packet chasing: Spying on network packets over a cache side-channel

M Taram, A Venkat, D Tullsen - 2020 ACM/IEEE 47th Annual …, 2020 - ieeexplore.ieee.org
This paper presents Packet Chasing, an attack on the network that does not require access
to the network, and works regardless of the privilege level of the process receiving the …

Vespa: Multi-layered self-protection for cloud resources

A Wailly, M Lacoste, H Debar - … of the 9th international conference on …, 2012 - dl.acm.org
Self-protection has recently raised growing interest as possible element of answer to the
cloud computing infrastructure protection challenge. Faced with multiple threats and …

System and method for controlling multiple computer peripheral devices using a generic driver

K Brandstätter, S Heinrich, S Vella - US Patent 9,329,887, 2016 - Google Patents
Driver Analyzer 400 second operating system or a second processor platform, handling, by
the generic device driver, interfaces between the first operating system, the peripheral …

Protecting commodity operating system kernels from vulnerable device drivers

S Butt, V Ganapathy, MM Swift… - 2009 Annual Computer …, 2009 - ieeexplore.ieee.org
Device drivers on commodity operating systems execute with kernel privilege and have
unfettered access to kernel data structures. Several recent attacks demonstrate that such …

Securing the device drivers of your embedded systems: framework and prototype

Z Li, J Wang, M Sun, JCS Lui - … of the 14th International Conference on …, 2019 - dl.acm.org
Device drivers on Linux-powered embedded or IoT systems execute in kernel space thus
must be fully trusted. Any fault in drivers may significantly impact the whole system …

[PDF][PDF] Evaluation of software-based fault-tolerant techniques on embedded OS's components

HM Makrani, AMH Monazzah, H Farbeh… - Proceedings of the …, 2014 - researchgate.net
Software-based fault-tolerant techniques at the operating system level are an effective way
to enhance the reliability of safety-critical embedded applications. This paper provides an …

Mitigation of kernel memory corruption using multiple kernel memory mechanism

H Kuzuno, T Yamauchi - IEEE Access, 2021 - ieeexplore.ieee.org
Operating systems adopt kernel protection methods (eg, mandatory access control, kernel
address space layout randomization, control flow integrity, and kernel page table isolation) …