Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,294,972 papers from all fields of science
Search
Sign In
Create Free Account
Loadable kernel module
Known as:
Linux kernel module
, Loadable kernel modules
, Module (Linux)
Expand
In computing, a loadable kernel module (or LKM) is an object file that contains code to extend the running kernel, or so-called base kernel, of an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
386BSD
AIX
AQuoSA
Address space layout randomization
Expand
Broader (2)
FreeBSD
Linux
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Moving mobile applications between mobile devices seamlessly
Volker Schuchardt
International Conference on Software Engineering
2012
Corpus ID: 8976455
Users prefer using multiple mobile devices interchangeably by switching between the devices. A solution to this requirement is…
Expand
2012
2012
DETECTING AND CORRECTING MOTION BLUR FROM IMAGES SHOT WITH CHANNEL-DEPENDENT EXPOSURE TIME
L. Lelégard
,
Emeric Delaygue
,
Mathieu Brédif
,
B. Vallet
2012
Corpus ID: 11028025
Abstract. This article describes a pipeline developed to automatically detect and correct motion blur due to the airplane motion…
Expand
2009
2009
Shepherding Loadable Kernel Modules through On-demand Emulation
Chaoting Xuan
,
J. Copeland
,
R. Beyah
International Conference on Detection of…
2009
Corpus ID: 11899723
Despite many advances in system security, rootkits remain a threat to major operating systems. First, this paper discusses why…
Expand
2009
2009
Securing Enterprise Networks Using Traffic Tainting
Anirudh Ramachandran
,
Y. Mundada
,
Mukarram Tariq
,
N. Feamster
2009
Corpus ID: 13071758
Enterprise networks are vulnerable to attacks ranging from data leaks to the spread of malware to insider threats. Previous…
Expand
2006
2006
Design and Implementation of Anycast Protocols for Mobile Ad-hoc Networks
C.R. Dow
,
R. Hsuan
,
S.F. Hwang
8th International Conference Advanced…
2006
Corpus ID: 27770276
In mobile ad-hoc networks, anycast techniques can be used to find the nearest service through the anycast address. Although some…
Expand
2004
2004
Detecting exploit code execution in loadable kernel modules
H. Xu
,
Wenliang Du
,
S. Chapin
Asia-Pacific Computer Systems Architecture…
2004
Corpus ID: 816220
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of…
Expand
2003
2003
A scaled, immunological approach to anomaly countermeasures: combining pH with cfengine
Kyrre M. Begnum
,
M. Burgess
IFIP/IEEE Eighth International Symposium on…
2003
Corpus ID: 27812443
We discuss the combination of two anomaly detection models, the Linux kernel module pH and cfengine, in order to create a multi…
Expand
2002
2002
'QoS Safe' kernel extensions for real-time resource management
R. West
,
Jason Gloudon
Proceedings 14th Euromicro Conference on Real…
2002
Corpus ID: 14723905
General-purpose operating systems are ill-equipped to meet the quality of service (QoS) requirements of complex real-time…
Expand
2001
2001
Kernel korner: Loadable kernel module exploits
W. C. Benton
2001
Corpus ID: 61004000
Many useful computer security tool ideas have a common genesis: the cracker world. Tools, like port scanners and password…
Expand
1997
1997
A power efficient implementation of the discrete cosine transform
C. Schimpfle
,
P. Rieder
,
J. Nossek
Conference Record of the Thirty-First Asilomar…
1997
Corpus ID: 23881562
A new efficient implementation of a IEEE-standard conform 8 point discrete cosine transform (DCT) is presented. The architecture…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required