Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification

Trent Jaeger, Paul C. Van Oorschot, Glenn Wurster

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

Motivated by the goal of hardening operating system kernels against rootkits and related malware, we survey the common interfaces and methods which can be used to modify (either legitimately or maliciously) the kernel which is run on a commodity desktop computer. We also survey how these interfaces can be restricted or disabled. While we concentrate mainly on Linux, many of the methods for modifying kernel code also exist on other operating systems, some of which are discussed.

Original languageEnglish (US)
Pages (from-to)571-579
Number of pages9
JournalComputers and Security
Volume30
Issue number8
DOIs
StatePublished - Nov 2011

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Law

Fingerprint Dive into the research topics of 'Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification'. Together they form a unique fingerprint.

Cite this