Kernel vulnerability analysis: A survey

8Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Kernel vulnerability may lead to information disclosure, privilege escalation, rootkit planting, etc. Nowadays mobile devices and other smart products has been increasingly available. Modern operation systems need to support new functions like GSM, Bluetooth, Wi-Fi, GPS, Camera of the smart devices. As a result, the number and categories of vulnerabilities and attacks is dramatically increasing. Correspondingly, varieties of researches have gone into finding such vulnerabilities in kernel. The kernel vulnerability analysis methods are vastly diverse. This paper surveys the state of the art on kernel vulnerability analysis. We summarize, compare, evaluate existing methods and provide the features, strengths and weaknesses of each kind of approaches. Then we present the trend on kernel vulnerability analysis. First, analysis on the system call, file system and the driver code become increasingly important. Second, existing methods can only handle limited kinds of vulnerabilities, which is insufficient for kernels, which contains modules, drivers, core kernel etc.. Third, the method for kernel vulnerability analysis will continuously focused on restricted parts of kernels or limited types of vulnerabilities for the kernel is implemented differently according to their platforms.

Cite

CITATION STYLE

APA

Lu, S., Lin, Z., & Zhang, M. (2019). Kernel vulnerability analysis: A survey. In Proceedings - 2019 IEEE 4th International Conference on Data Science in Cyberspace, DSC 2019 (pp. 549–554). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/DSC.2019.00089

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free