Address space isolation in the Linux kernel

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Monolithic kernel design mandates the use of a single address space for kernel data and code. While this design is easy to understand and performs well, it does not provide much in the way of protection from exploitable bugs in the interface. By dividing up kernel objects into areas of responsibility, we can introduce additional address spaces which will prevent information leakage, even in the case of a successful attack on the kernel. We are exploring several possible implementations with the goal of increasing security while minimizing the impact on performance.

Author supplied keywords

References Powered by Scopus

On μ-Kernel Construction

386Citations
N/AReaders
Get full text

Cited by Powered by Scopus

seL4 Microkernel for Virtualization Use-Cases: Potential Directions towards a Standard VMM

7Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Nider, J., Rapoport, M., & Bottomley, J. (2019). Address space isolation in the Linux kernel. In SYSTOR 2019 - Proceedings of the 12th ACM International Systems and Storage Conference (p. 194). Association for Computing Machinery, Inc. https://doi.org/10.1145/3319647.3325855

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

100%

Readers' Discipline

Tooltip

Computer Science 3

100%

Save time finding and organizing research with Mendeley

Sign up for free