Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,935,571 papers from all fields of science
Search
Sign In
Create Free Account
Loadable kernel module
Known as:
Linux kernel module
, Loadable kernel modules
, Module (Linux)
Expand
In computing, a loadable kernel module (or LKM) is an object file that contains code to extend the running kernel, or so-called base kernel, of an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
386BSD
AIX
AQuoSA
Address space layout randomization
Expand
Broader (2)
FreeBSD
Linux
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Optimality conditions for a bilevel matroid problem
D. Fanghänel
Journal of combinatorial optimization
2011
Corpus ID: 20588588
In bilevel programming there are two decision makers, the leader and the follower, who act in a hierarchy. In this paper we deal…
Expand
2010
2010
Memory and representation of World War II in contemporary British and German fiction: a comparative analysis
Cr Barenberg
2010
Corpus ID: 160407591
This thesis constitutes the first detailed attempt to compare British and German contemporary prose fiction in relation to the…
Expand
Review
2010
Review
2010
Self-defence of information systems in cyber-space : a critical overview
Mario Couture
,
R. Charpentier
,
M. Dagenais
,
A. Hamou-lhadj
,
Abdelouahed Gherbi
2010
Corpus ID: 53639184
Abstract : Nowadays information systems (ISs) that are utilized to support military operations are much more complex than a…
Expand
2009
2009
Shepherding Loadable Kernel Modules through On-demand Emulation
Chaoting Xuan
,
J. Copeland
,
R. Beyah
International Conference on Detection of…
2009
Corpus ID: 11899723
Despite many advances in system security, rootkits remain a threat to major operating systems. First, this paper discusses why…
Expand
2009
2009
Securing Enterprise Networks Using Traffic Tainting
Anirudh Ramachandran
,
Y. Mundada
,
Mukarram Tariq
,
N. Feamster
2009
Corpus ID: 13071758
Enterprise networks are vulnerable to attacks ranging from data leaks to the spread of malware to insider threats. Previous…
Expand
2008
2008
OS Support for Virtualizing Hardware Transactional Memory
M. Swift
,
Haris Volos
,
Neelam Goyal
,
Luke Yen
,
M. Hill
,
D. Wood
2008
Corpus ID: 409950
Transactional memory promises to simplify multithreaded programming. Hardware TM (HTM) implementations promise better performance…
Expand
2007
2007
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
R. Ando
,
Y. Kadobayashi
,
Y. Shinoda
International Conference on Information Security…
2007
Corpus ID: 6408323
VMM (virtual machine monitor) provides the useful inspection and interposition of the guest OS. With proper modification of the…
Expand
Review
2007
Review
2007
Rootkit detection from outside the Matrix
Sébastien Josse
Journal in Computer Virology
2007
Corpus ID: 11822477
The main purpose of this article is to present a secure engine which is specifically designed for a security analyst when…
Expand
2002
2002
Use of openMosix for parallel I/O balancing on storage in Linux cluster
G. Argentini
arXiv.org
2002
Corpus ID: 6289946
In this paper I present some experiences made in the matter of I/O for Linux Clustering. In particular is illustrated the use of…
Expand
2001
2001
Kernel korner: Loadable kernel module exploits
W. C. Benton
2001
Corpus ID: 61004000
Many useful computer security tool ideas have a common genesis: the cracker world. Tools, like port scanners and password…
Expand