The KPLT: The Kernel as a shared object

@article{Brookes2015TheKT,
  title={The KPLT: The Kernel as a shared object},
  author={Scott Brookes and Martin Osterloh and Robert Denz and Stephen Taylor},
  journal={MILCOM 2015 - 2015 IEEE Military Communications Conference},
  year={2015},
  pages={954-959}
}
Vulnerability amplification is an ever increasing problem in homogeneous large scale networks that operate many instances of the same operating system. Diversification of a process image through techniques such as Address Space Layout Randomization (ASLR) is a commonly used defense against vulnerability amplification. One approach to diversification of a process image is load-time diversity. This paper presents a Kernel Procedure Linkage Table (KPLT) that allows for a unique diversified kernel… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 13 REFERENCES

SoK: Automated Software Diversity

  • 2014 IEEE Symposium on Security and Privacy
  • 2014
VIEW 1 EXCERPT

You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code

  • ACM Conference on Computer and Communications Security
  • 2014
VIEW 1 EXCERPT

Brute force bypassing of aslr on linux

C. Otterstad
  • Norsk informasjonssikkerhetskonferanse (NISK), vol. 2012, 2012.
  • 2012
VIEW 1 EXCERPT

An Analysis of Address Space Layout Randomization on Windows VistaTM

O. Whitehouse
  • tech. rep., Symantec, 2007.
  • 2007
VIEW 1 EXCERPT

On the Effectiveness of Address-Space Randomization

H. Shacham, E. jin Goh, N. Modadugu, B. Pfaff, D. Boneh
  • In CCS 04: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 298–307, ACM Press, 2004.
  • 2004
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…