Monolithic kernel design mandates the use of a single address space for kernel data and code. While this design is easy to understand and performs well, it does not provide much in the way of protection from exploitable bugs in the interface. By dividing up kernel objects into areas of responsibility, we can introduce additional address spaces which will prevent information leakage, even in the case of a successful attack on the kernel. We are exploring several possible implementations with the goal of increasing security while minimizing the impact on performance.
Mendeley helps you to discover research relevant for your work.
CITATION STYLE
Nider, J., Rapoport, M., & Bottomley, J. (2019). Address space isolation in the Linux kernel. In SYSTOR 2019 - Proceedings of the 12th ACM International Systems and Storage Conference (p. 194). Association for Computing Machinery, Inc. https://doi.org/10.1145/3319647.3325855