Moving Vulnerable Kernel Logic Into User Space
dc.contributor.advisor | Malik, Khalid | |
dc.contributor.author | Raymond, Ryan | |
dc.date.accessioned | 2023-06-22T16:23:28Z | |
dc.date.available | 2023-06-22T16:23:28Z | |
dc.description.abstract | Programs which run at ring zero are a security risk. Moving code into user space can mitigate this risk. As a demonstration, a simple kernel module with vulnerable logic was used as a control case. This module was capable of targeted data exfiltration from the kernel. It was shown that moving the application logic into user space decreased the severity of the vulnerability. Furthermore, rewriting the user space program in Guile – a very high-level language – removed the vulnerability entirely. | en_US |
dc.identifier.uri | http://hdl.handle.net/10323/12117 | |
dc.subject | Guile | en_US |
dc.subject | Linux | en_US |
dc.subject | C | en_US |
dc.subject | Security | en_US |
dc.subject | Exfiltration | en_US |
dc.subject | Module | en_US |
dc.subject | Kernel | en_US |
dc.subject | Lisp | en_US |
dc.subject | Microkernel | en_US |
dc.title | Moving Vulnerable Kernel Logic Into User Space | en_US |
dc.type | Thesis | eng |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 3.41 KB
- Format:
- Item-specific license agreed upon to submission
- Description: