2021
DOI: 10.1109/access.2021.3101452
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism

Abstract: Operating systems adopt kernel protection methods (e.g., mandatory access control, kernel address space layout randomization, control flow integrity, and kernel page table isolation) as essential countermeasures to reduce the likelihood of kernel vulnerability attacks. However, kernel memory corruption can still occur via the execution of malicious kernel code at the kernel layer. This is because the vulnerable kernel code and the attack target kernel code or kernel data are located in the same kernel address … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…Moving Target Defense (MTD) techniques are used to defend against CRAs [50]. Different defense techniques were introduced to mitigate the attacks on the control flow of software in [51], [52]. Control-flow attacks enable malicious actors to change the flow of code execution.…”
Section: ) Ghumvee Overviewmentioning
confidence: 99%
“…Moving Target Defense (MTD) techniques are used to defend against CRAs [50]. Different defense techniques were introduced to mitigate the attacks on the control flow of software in [51], [52]. Control-flow attacks enable malicious actors to change the flow of code execution.…”
Section: ) Ghumvee Overviewmentioning
confidence: 99%
“…In the case of the kernel security issue (CVE-2015-1805), the situation is even more complex since this bug is caused by kernel "misbehaviour". Kernel is entitled to have full access to system memory, and it already has a lot of mechanisms [66][67][68][69] that should prevent such issues. Therefore, we do not think that there is currently any other reliable way of dealing with similar attacks other than regularly installing firmware updates.…”
Section: Possible Mitigation Techniquesmentioning
confidence: 99%