Moving Vulnerable Kernel Logic Into User Space

dc.contributor.advisorMalik, Khalid
dc.contributor.authorRaymond, Ryan
dc.date.accessioned2023-06-22T16:23:28Z
dc.date.available2023-06-22T16:23:28Z
dc.description.abstractPrograms which run at ring zero are a security risk. Moving code into user space can mitigate this risk. As a demonstration, a simple kernel module with vulnerable logic was used as a control case. This module was capable of targeted data exfiltration from the kernel. It was shown that moving the application logic into user space decreased the severity of the vulnerability. Furthermore, rewriting the user space program in Guile – a very high-level language – removed the vulnerability entirely.en_US
dc.identifier.urihttp://hdl.handle.net/10323/12117
dc.subjectGuileen_US
dc.subjectLinuxen_US
dc.subjectCen_US
dc.subjectSecurityen_US
dc.subjectExfiltrationen_US
dc.subjectModuleen_US
dc.subjectKernelen_US
dc.subjectLispen_US
dc.subjectMicrokernelen_US
dc.titleMoving Vulnerable Kernel Logic Into User Spaceen_US
dc.typeThesiseng

Files

Original bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
thesis.pdf
Size:
170.01 KB
Format:
Adobe Portable Document Format
Description:
Thesis Document
No Thumbnail Available
Name:
HC3900_RAYMOND_RYAN.zip
Size:
15.23 MB
Format:
Unknown data format
Description:
Source for Document and Programs
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
3.41 KB
Format:
Item-specific license agreed upon to submission
Description: