کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
454516 695219 2011 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification
چکیده انگلیسی

Motivated by the goal of hardening operating system kernels against rootkits and related malware, we survey the common interfaces and methods which can be used to modify (either legitimately or maliciously) the kernel which is run on a commodity desktop computer. We also survey how these interfaces can be restricted or disabled. While we concentrate mainly on Linux, many of the methods for modifying kernel code also exist on other operating systems, some of which are discussed.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computers & Security - Volume 30, Issue 8, November 2011, Pages 571–579
نویسندگان
, , ,