A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Analyzing and improving Linux kernel memory protection
2010
Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10
Code injection continues to pose a serious threat to computer systems. Among existing solutions, W ⊕X is a notable approach to prevent the execution of injected code. In this paper, we focus on the Linux kernel memory protection and systematically check for possible W ⊕ X violations in the Linux kernel design and implementation. In particular, we have developed a Murphi-based abstract model and used it to discover several serious shortcomings in the current Linux kernel that violate the W ⊕ X
doi:10.1145/1920261.1920301
dblp:conf/acsac/LiakhGJ10
fatcat:xenpucv6vbfnnmgi7v2xspey2a