2011
DOI: 10.1109/tifs.2011.2159712
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive and Efficient Protection of Kernel Control Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(10 citation statements)
references
References 26 publications
0
10
0
Order By: Relevance
“…The precise points-to sets can only be determined globally, which makes modularity and dynamic library reuse challenging. This the main reason why this solution works great with monolithic kernels [70] or hypervisors [71], where every module is statically linked together, but has not been deployed for dynamically linked applications. A weaker, but more practical policy is restricting indirect control transfers to the union of all their points-to sets (cf.…”
Section: B Control-flow Integritymentioning
confidence: 99%
“…The precise points-to sets can only be determined globally, which makes modularity and dynamic library reuse challenging. This the main reason why this solution works great with monolithic kernels [70] or hypervisors [71], where every module is statically linked together, but has not been deployed for dynamically linked applications. A weaker, but more practical policy is restricting indirect control transfers to the union of all their points-to sets (cf.…”
Section: B Control-flow Integritymentioning
confidence: 99%
“…Like them, we build software counters by inserting increment-trigger instruction before each monitored instruction. SBCFI Petroni and Hicks (2007) and Indexed hook Li et al (2011) present two interesting approaches to protect kernel control flow. Since the attackers usually persistently modify kernel control data to prolong the control of the kernel, SBCFI Petroni and Hicks (2007) checks the kernel control data in interval for the less performance overhead.…”
Section: Protecting Intended Control Flowmentioning
confidence: 99%
“…There is a collection of CFI efforts Abadi et al (2005); Petroni and Hicks (2007); ; Li et al (2011); . However, most of them target to keep known control flow in good integrity, but fail to catch hidden control flow.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, HookSafe only protects the hooks but not the non-control data. IndexedHooks [51] provides an alternative implementation of CFI for the FreeBSD 8.0 kernel by replacing function addresses with indexes into read-only tables, but IndexedHooks still requires source code.…”
Section: Specialized Integrity Property Measurementmentioning
confidence: 99%
“…IndexedHooks [51] provides an alternative implementation of CFI for the FreeBSD 8.0 kernel by replacing function addresses with indexes into read-only tables, and it is capable of supporting new device drivers. However, similar to SBCFI, IndexedHooks requires source code so it does not satisfy the inclusiveness requirement.…”
Section: False Alarmsmentioning
confidence: 99%