Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments 2020
DOI: 10.1145/3381052.3381328
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight kernel isolation with virtualization and VM functions

Abstract: Commodity operating systems execute core kernel subsystems in a single address space along with hundreds of dynamically loaded extensions and device drivers. Lack of isolation within the kernel implies that a vulnerability in any of the kernel subsystems or device drivers opens a way to mount a successful attack on the entire kernel.Historically, isolation within the kernel remained prohibitive due to the high cost of hardware isolation primitives. Recent CPUs, however, bring a new set of mechanisms. Extended … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(1 citation statement)
references
References 41 publications
0
1
0
Order By: Relevance
“…Isolation based on an operating system kernel is one of the most reliable and depends on the OS kernel's security. The OS kernel provides the primary isolation between the applications running on top [62]. Hardware-based isolation is provided by the processors or special devices that work with the processor.…”
Section: Isolation Techniques In 5g Areasmentioning
confidence: 99%
“…Isolation based on an operating system kernel is one of the most reliable and depends on the OS kernel's security. The OS kernel provides the primary isolation between the applications running on top [62]. Hardware-based isolation is provided by the processors or special devices that work with the processor.…”
Section: Isolation Techniques In 5g Areasmentioning
confidence: 99%