MILCOM 2015 - 2015 IEEE Military Communications Conference 2015
DOI: 10.1109/milcom.2015.7357568
|View full text |Cite
|
Sign up to set email alerts
|

The KPLT: The Kernel as a shared object

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Existing distributed witness node-based detection schemes of NRA are vulnerable to attacks known as smart attack of which are variations of NRA [25]. These attacks are a source of vulnerability for these detection schemes [20]. In the next chapters, unique solutions to some of the problems inherent in the already implemented strategies will be proposed [8].…”
Section: Discussionmentioning
confidence: 99%
“…Existing distributed witness node-based detection schemes of NRA are vulnerable to attacks known as smart attack of which are variations of NRA [25]. These attacks are a source of vulnerability for these detection schemes [20]. In the next chapters, unique solutions to some of the problems inherent in the already implemented strategies will be proposed [8].…”
Section: Discussionmentioning
confidence: 99%
“…25 Finally, although microkernel code is replicated in user processes, in common with many other operating system designs, an additional level of indirection allows its location within each process to be obfuscated. 26 Like MINIX, all potentially contaminated user processes, device drivers, and services are executed with user-level privileges and are strictly isolated from the microkernel via a message-passing interface. However, unlike MINIX, there is no system task, all system calls, IO, and process scheduling are achieved by interrupt handlers with kernel privileges.…”
Section: Motivationsmentioning
confidence: 99%
“…The BSP then zeros the region of low memory used by the AP cores as well as loading the trampoline code (lines 12 and 14). The BSP then enters the loop that will boot all of the AP cores on the system (lines [18][19][20][21][22][23][24][25][26][27][28]. For each AP core, it also creates a new stack that will be used by the AP core once it enters 64-bit long mode.…”
Section: Booting the Application Coresmentioning
confidence: 99%
See 1 more Smart Citation