Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Context-sensitive and directional concurrency fuzzing for data-race detection
Fuzzing is popular for bug detection and vulnerability discovery nowadays. To adopt fuzzing
for concurrency problems like data races, several recent concurrency fuzzing approaches …
for concurrency problems like data races, several recent concurrency fuzzing approaches …
{KSplit}: Automating device driver isolation
Researchers have shown that recent CPU extensions support practical, low-overhead driver
isolation to protect kernels from defects and vulnerabilities in device drivers. With …
isolation to protect kernels from defects and vulnerabilities in device drivers. With …
Software fault isolation with API integrity and multi-principal modules
The security of many applications relies on the kernel being secure, but history suggests that
kernel vulnerabilities are routinely discovered and exploited. In particular, exploitable …
kernel vulnerabilities are routinely discovered and exploited. In particular, exploitable …
[PDF][PDF] Tolerating malicious device drivers in Linux
S Boyd-Wickizer, N Zeldovich - 2010 USENIX Annual Technical …, 2010 - usenix.org
This paper presents SUD, a system for running existing Linux device drivers as untrusted
user-space processes. Even if the device driver is controlled by a malicious adversary, it …
user-space processes. Even if the device driver is controlled by a malicious adversary, it …
ConSeq: detecting concurrency bugs through sequential errors
Concurrency bugs are caused by non-deterministic interleavings between shared memory
accesses. Their effects propagate through data and control dependences until they cause …
accesses. Their effects propagate through data and control dependences until they cause …
Microkernel Goes General: Performance and Compatibility in the {HongMeng} Production Microkernel
The virtues of security, reliability, and extensibility have made state-of-the-art microkernels
prevalent in embedded and safety-critical scenarios. However, they face performance and …
prevalent in embedded and safety-critical scenarios. However, they face performance and …
How {Double-Fetch} situations turn into {Double-Fetch} vulnerabilities: A study of double fetches in the linux kernel
We present the first static approach that systematically detects potential double-fetch
vulnerabilities in the Linux kernel. Using a pattern-based analysis, we identified 90 double …
vulnerabilities in the Linux kernel. Using a pattern-based analysis, we identified 90 double …
Automatic device driver synthesis with Termite
Faulty device drivers cause significant damage through down time and data loss. The
problem can be mitigated by an improved driver development process that guarantees …
problem can be mitigated by an improved driver development process that guarantees …
VirtuOS: An operating system with kernel virtualization
R Nikolaev, G Back - Proceedings of the Twenty-Fourth ACM Symposium …, 2013 - dl.acm.org
Most operating systems provide protection and isolation to user processes, but not to critical
system components such as device drivers or other system code. Consequently, failures in …
system components such as device drivers or other system code. Consequently, failures in …
Tolerating hardware device failures in software
Hardware devices can fail, but many drivers assume they do not. When confronted with real
devices that misbehave, these assumptions can lead to driver or system failures. While …
devices that misbehave, these assumptions can lead to driver or system failures. While …