Cross-checking semantic correctness: The case of finding file system bugs

C Min, S Kashyap, B Lee, C Song, T Kim - Proceedings of the 25th …, 2015 - dl.acm.org
Today, systems software is too complex to be bug-free. To find bugs in systems software,
developers often rely on code checkers, like Linux's Sparse. However, the capability of …

Specification and verification in the field: Applying formal methods to {BPF} just-in-time compilers in the linux kernel

L Nelson, J Van Geffen, E Torlak, X Wang - 14th USENIX Symposium on …, 2020 - usenix.org
This paper describes our experience applying formal methods to a critical component in the
Linux kernel, the just-in-time compilers (" JITs") for the Berkeley Packet Filter (BPF) virtual …

Jitk: A Trustworthy {In-Kernel} Interpreter Infrastructure

X Wang, D Lazar, N Zeldovich, A Chlipala… - … USENIX Symposium on …, 2014 - usenix.org
Modern operating systems run multiple interpreters in the kernel, which enable user-space
applications to add new functionality or specialize system policies. The correctness of such …

Synthesizing jit compilers for in-kernel dsls

J Van Geffen, L Nelson, I Dillig, X Wang… - … Conference on Computer …, 2020 - Springer
Modern operating systems allow user-space applications to submit code for kernel
execution through the use of in-kernel domain specific languages (DSLs). Applications use …

From zygote to morula: Fortifying weakened aslr on android

B Lee, L Lu, T Wang, T Kim… - 2014 IEEE Symposium on …, 2014 - ieeexplore.ieee.org
There have been many research efforts to secure Android applications and the high-level
system mechanisms. The low-level operating system designs have been overlooked …

PIE: Parser identification in embedded systems

L Cojocar, J Zaddach, R Verdult, H Bos… - Proceedings of the 31st …, 2015 - dl.acm.org
Embedded systems are responsible for the security and safety of modern societies,
controlling the correct operation of cars and airplanes, satellites and medical equipment …

System and method for detecting interpreter-based exploit attacks

S Paithane, SO Vashisht - US Patent 10,887,328, 2021 - Google Patents
(74) Attorney, Agent, or Firm—Rutan & Tucker, LLP (57) ABSTRACT For one embodiment, a
computerized method for detecting exploit attacks on an interpreter comprises configuring a …

Towards Practical Application-level Support for Privilege Separation

N Sultana, H Zhu, K Zhong, Z Zheng, R Mao… - Proceedings of the 38th …, 2022 - dl.acm.org
Privilege separation (privsep) is an effective technique for improving software's security, but
privsep involves decomposing software into components and assigning them different …

Cachematic-automatic invalidation in application-level caching systems

V Holmqvist, J Nilsfors, P Leitner - Proceedings of the 2019 ACM/SPEC …, 2019 - dl.acm.org
Caching is a common method for improving the performance of modern web applications.
Due to the varying architecture of web applications, and the lack of a standardized approach …

[PDF][PDF] A Study on faults and error propagation in the linux operating system

T Yoshimura - 2016 - core.ac.uk
Operating systems are crucial for computer systems reliability. Operating system kernels fail
less frequently than applications, but failures on them cause a severe impact on the entire …