Publication | Closed Access
Safe kernel programming in the OKE
45
Citations
10
References
2003
Year
Unknown Venue
EngineeringInformation SecuritySoftware EngineeringSoftware AnalysisFormal VerificationHardware SecuritySafe Kernel ProgrammingTrusted CompilerTrusted Execution EnvironmentCompilersTrusted Operating SystemOperating System SecurityComputer EngineeringComputer ScienceLanguage-based SecurityLanguage CustomisationData SecuritySoftware SecurityOperating SystemsProgram AnalysisTrust ManagementUnikernelsSystem Software
This paper describes the implementation of the OKE, which allows users other than root to load native and fully optimised code in the Linux kernel. Safety is guaranteed by trust management, language customisation and a trusted compiler. By coupling trust management with the compiler, the OKE is able to vary the level of restrictions on the code running in the kernel, depending on the programmer's privileges. Static sandboxing is used as much as possible to check adherence to the security policies at compile time.
| Year | Citations | |
|---|---|---|
1993 | 1.2K | |
1995 | 949 | |
1993 | 869 | |
2002 | 617 | |
2000 | 537 | |
1996 | 502 | |
2002 | 404 | |
2000 | 172 | |
1994 | 131 | |
2003 | 49 |
Page 1
Page 1