- 2001-OSR: Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code
- 2019-FSE:Detecting Concurrency Memory Corruption Vulnerabilities — 【tool-CONVUL】
- 2021-NDSS: KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel
- 2019-USENIX-ATC:Effective Static Analysis of Concurrency Use-After-Free Bugs in Linux Device Drivers — 【note】
- 2020-CCS: Exaggerated Error Handling Hurts! An In-Depth Study and Context-Aware Detection
- 2019-USENIX:PeX: A Permission Check Analysis Framework for Linux Kernel
- 2018-S&P:DEADLINE-Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels — 【note】【note2】【note3】【tool-DEADLINE】
-
2020-TOCS:Effective Detection of Sleep-in-atomic-context Bugs in the Linux Kernel
-
2019-ASPLOS: DCNS: Automated Detection Of Conservative Non-Sleep Defects in the Linux Kernel
-
2019-USENIX:Detecting Missing-Check Bugs via Semantic- and Context-Aware Criticalness and Constraints Inferences — 【tool-CRIX】
-
2018-USENIX-ATC:DSAC: Effective Static Analysis of Sleep-in-Atomic-Context Bugs in Kernel Modules
-
2018-NDSS:K-Miner: Uncovering Memory Corruption in Linux — 【note】【note2】【tool-K-Miner】
-
2018-CCS:Check It Again- Detecting Lacking-Recheck Bugs in OS Kernels — 【note】【note2】【tool-LRSan】
-
2017-USENIX:How Double-Fetch Situations turn into DoubleFetch — 【note】【tool】
-
2017-USENIX:DR. CHECKER- A Soundy Analysis for Linux Kernel Drivers — 【tool-dr_checker】
-
2017-USENIX:Digtool- A Virtualization-Based Framework for Detecting Kernel Vulnerabilities-usenix — 【note】【note2】【note3】【note4】
-
2017-EUROSYS:DangSan - Scalable Use-after-free Detection — 【tool-dangsan】
-
2016-USENIX:APISan: Sanitizing API Usages through Semantic Cross-Checking — 【tool-apisan】
-
2016-USENIX:UniSan-Proactive Kernel Memory Initialization to Eliminate Data Leakages — 【note】【tool-unisan】
-
2015-SOSP:Cross-checking semantic correctness: The case of finding file system bugs — 【tool-JUXTA】
-
2014-USENIX:Static Analysis of Variability in System Software - The 90, 000 #ifdefs Issue
-
2013-DSN: Hector: Detecting resource-release omission faults in error-handling code for systems software
-
2013-WCRE: Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries
-
2008-EUROSYS: Documenting and automating collateral evolutions in linux device drivers
-
2007-ICSE: Pathsensitive inference of function precedence protocols
-
2005-ESEC/FSE: Context- and Path-sensitive Memory Leak Detection
- 2020-SP: xMP: Selective Memory Protection for Kernel and User Space
- 2017-EUROSP: On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms
- 2017-NDSS: PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables
- 2017-EuroSys: kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse
- 2016-CCS: Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
- 2016-CNS: Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification
- 2015-ASPLOS: Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
- 2015-ATC: SecPod: A Framework for Virtualization-based Security Systems
- 2012-ACSEC: Efficient protection of kernel data structures via object partitioning
- 2011-ASPLOS: Ensuring Operating System Kernel Integrity with OSck
- 2011-NDSS: Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions
- 2010-CCS: Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
- 2010-SP: Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
- 2010-SP: TrustVisor: Efficient TCB Reduction and Attestation
- 2010-ACSEC: Analyzing and improving Linux kernel memory protection: a model checking approach
- 2009-CCS: Countering kernel rootkits with lightweight hook protection
- 2009-USENIX: Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
- 2009-ACSEC: Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
- 2007-SOSP: SecVisor : A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes
- 2017-NDSS:Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM
- 2016-HPCC-SmartCity-DSS: TZ-KPM:Kernel Protection Mechanism on Embedded Devices on Hardware-Assisted Isolated Environment
- 2016-NDSS: SKEE: A lightweight Secure Kernel-level Execution Environment for ARM
- 2014-MST: SPROBES: Enforcing Kernel Code Integrity on the TrustZone Architecture
- 2014-CCS: Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World
- 2018-DAC: Hypernel: a hardware-assisted framework for kernel protection without nested paging
- 2016-CNS: Preventing kernel code-reuse attacks through disclosure resistant code diversification
- 2016-HASP:Architectural supports to protect OS kernels from code-injection attacks
- 2008-RAID: Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing
- 1999-ICDCS: Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code
Type | Date | Paper |
---|---|---|
KLAT - PageTable | ||
2017-NDSS | PT-Rand: Practical Mitigation of Data-only Attacks against Page TablesPT-Rand | |
2010-ACSEC | Analyzing and Improving Linux Kernel Memory Protection: A Model Checking Approach | |
KLAT - Code | ||
2017-EuroSys | kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse | |
2016-CNS | Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification | |
2015-SP | Readactor: Practical Code Randomization Resilient to Memory Disclosure | |
2015-ASPLOS | Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation | |
2014-SIGSAC | You Can Run but You Can’t Read: Preventing Disclosure Exploits in Executable Code | |
1999-ICDCS | Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code | |
SLAT - PageTable | ||
2020-SP | xMP: Selective Memory Protection for Kernel and User Space | |
2017-EUROP | On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms | |
2016-ATC | SecPod: SecPod: a Framework for Virtualization-based Security Systems | |
2007-SOSP | SecVisor : A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes | |
USENIX-2018 | EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs | |
VEE-2020 | Lightweight Kernel Isolation with Virtualization and VM Functions | |
SLAT - Code | ||
2011-NDSS | Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions | |
2010-SP | TrustVisor: Efficient TCB Reduction and Attestation | |
2009-CCS | Countering kernel rootkits with lightweight hook protection | |
2009-ACSEC | Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System | |
2008-RAID | Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing | |
Other Hardwares - PageTable | ||
2014-CCS | Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World | |
Other Hardwares - Code | ||
2019-DATE | RiskiM: Toward Complete Kernel Protection with Hardware Support | |
2016-HPCC | TZ-KPM Kernel Protection Mechanism on Embedded Devices on Hardware-assisted Isolated Environment | |
2016-NDSS | SKEE: A lightweight Secure Kernel-level Execution Environment for ARM | |
2016-HASP | Architectural Supports to Protect OS Kernels from Code-Injection Attacks |
Type | Date | Paper |
---|---|---|
SYSCALL | ||
SOSP 2021 | HEALER: Relation Learning Guided Kernel Fuzzing | |
CCS 2021 | SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers | |
NDSS 2020 | HFL: Hybrid Fuzzing on the Linux Kernel | |
EuroSec 2020 | X-AFL: A Kernel fuzzer combining passive and active fuzzing | |
USENIX 2018 | MoonShine: Optimizing OS fuzzer seed selection with trace distillation | |
INPUT | ||
NDSS 2022 | EMS : History-Driven Mutation for Coverage-based Fuzzing | |
USENIX 2021 | SYZVEGAS : Beating Kernel Fuzzing Odds with Reinforcement Learning | |
DRIVER & FILESYSTEM | ||
NDSS 2022 | Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators | |
USENIX 2020 | USBFuzz: A framework for fuzzing USB drivers by device emulation | |
SP 2020 | Ex-vivo dynamic analysis framework for android device drivers | |
ACM Transactions on Storage 2020 | Finding Bugs in File Systems with an Extensible Fuzzing Framework | |
SP 2020 | KRACE : Data Race Fuzzing for Kernel File Systems | |
SP 2019 | Fuzzing File Systems via Two-Dimensional Input Space Exploration | |
SOSP 2019 | Finding semantic bugs in file systems with an extensible fuzzing framework | |
CCS 17 | Difuze: Interface aware fuzzing for kernel drivers | |
PERFORMANCE | ||
CCS 2021 | Hardware Support to Improve Fuzzing Performance and Precision | |
USENIX 2021 | Undo Workarounds for Kernel Bugs | |
USENIX 2020 | Agamotto : Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints | |
USENIX 2017 | KAFL: Hardware-assisted feedback fuzzing for OS kernels | |
STATE | ||
CCS 2021 | HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs | |
SP 2019 | Razzer: Finding kernel race bugs through fuzzing | |
WOOT 2019 | Unicorefuzz: On the viability of emulation for kernelspace fuzzing | |
OTHER | ||
USENIX 2022 | SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel |