Analysis and remodeling of the DirtyCOW vulnerability by debugging and abstraction

2Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It is hard to understand clearly the principle of DirtyCOW vulnerability of Linux operating system, even for many experienced kernel developers. An approach is presented to rebuild the design model of the related Linux system calls, which gives an insight into the vulnerability. The remodeling, i.e. model-rebuilding, is done by first constructing a control flow diagram based on the debugging and analysis of the OS kernel, and then turning the control flow diagram to an abstract program based on abstraction to the observed concrete states. The approach provides an effective way for the comprehension of complex legacy software.

Cite

CITATION STYLE

APA

Wen, Y., & Wang, J. (2020). Analysis and remodeling of the DirtyCOW vulnerability by debugging and abstraction. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12028 LNCS, pp. 3–12). Springer. https://doi.org/10.1007/978-3-030-41418-4_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free