It is hard to understand clearly the principle of DirtyCOW vulnerability of Linux operating system, even for many experienced kernel developers. An approach is presented to rebuild the design model of the related Linux system calls, which gives an insight into the vulnerability. The remodeling, i.e. model-rebuilding, is done by first constructing a control flow diagram based on the debugging and analysis of the OS kernel, and then turning the control flow diagram to an abstract program based on abstraction to the observed concrete states. The approach provides an effective way for the comprehension of complex legacy software.
CITATION STYLE
Wen, Y., & Wang, J. (2020). Analysis and remodeling of the DirtyCOW vulnerability by debugging and abstraction. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12028 LNCS, pp. 3–12). Springer. https://doi.org/10.1007/978-3-030-41418-4_1
Mendeley helps you to discover research relevant for your work.