[PDF][PDF] Context-sensitive and directional concurrency fuzzing for data-race detection

ZM Jiang, JJ Bai, K Lu, SM Hu - Network and Distributed Systems …, 2022 - par.nsf.gov
Fuzzing is popular for bug detection and vulnerability discovery nowadays. To adopt fuzzing
for concurrency problems like data races, several recent concurrency fuzzing approaches …

{KSplit}: Automating device driver isolation

Y Huang, V Narayanan, D Detweiler, K Huang… - … USENIX Symposium on …, 2022 - usenix.org
Researchers have shown that recent CPU extensions support practical, low-overhead driver
isolation to protect kernels from defects and vulnerabilities in device drivers. With …

Software fault isolation with API integrity and multi-principal modules

Y Mao, H Chen, D Zhou, X Wang, N Zeldovich… - Proceedings of the …, 2011 - dl.acm.org
The security of many applications relies on the kernel being secure, but history suggests that
kernel vulnerabilities are routinely discovered and exploited. In particular, exploitable …

[PDF][PDF] Tolerating malicious device drivers in Linux

S Boyd-Wickizer, N Zeldovich - 2010 USENIX Annual Technical …, 2010 - usenix.org
This paper presents SUD, a system for running existing Linux device drivers as untrusted
user-space processes. Even if the device driver is controlled by a malicious adversary, it …

ConSeq: detecting concurrency bugs through sequential errors

W Zhang, J Lim, R Olichandran, J Scherpelz… - ACM SIGARCH …, 2011 - dl.acm.org
Concurrency bugs are caused by non-deterministic interleavings between shared memory
accesses. Their effects propagate through data and control dependences until they cause …

Microkernel Goes General: Performance and Compatibility in the {HongMeng} Production Microkernel

H Chen, X Miao, N Jia, N Wang, Y Li, N Liu… - … USENIX Symposium on …, 2024 - usenix.org
The virtues of security, reliability, and extensibility have made state-of-the-art microkernels
prevalent in embedded and safety-critical scenarios. However, they face performance and …

How {Double-Fetch} situations turn into {Double-Fetch} vulnerabilities: A study of double fetches in the linux kernel

P Wang, J Krinke, K Lu, G Li… - 26th USENIX Security …, 2017 - usenix.org
We present the first static approach that systematically detects potential double-fetch
vulnerabilities in the Linux kernel. Using a pattern-based analysis, we identified 90 double …

Automatic device driver synthesis with Termite

L Ryzhyk, P Chubb, I Kuz, E Le Sueur… - Proceedings of the ACM …, 2009 - dl.acm.org
Faulty device drivers cause significant damage through down time and data loss. The
problem can be mitigated by an improved driver development process that guarantees …

VirtuOS: An operating system with kernel virtualization

R Nikolaev, G Back - Proceedings of the Twenty-Fourth ACM Symposium …, 2013 - dl.acm.org
Most operating systems provide protection and isolation to user processes, but not to critical
system components such as device drivers or other system code. Consequently, failures in …

Tolerating hardware device failures in software

A Kadav, MJ Renzelmann, MM Swift - Proceedings of the ACM SIGOPS …, 2009 - dl.acm.org
Hardware devices can fail, but many drivers assume they do not. When confronted with real
devices that misbehave, these assumptions can lead to driver or system failures. While …