Publication
SYSTOR 2019
Conference paper

Address space isolation in the Linux kernel

View publication

Abstract

Monolithic kernel design mandates the use of a single address space for kernel data and code. While this design is easy to understand and performs well, it does not provide much in the way of protection from exploitable bugs in the interface. By dividing up kernel objects into areas of responsibility, we can introduce additional address spaces which will prevent information leakage, even in the case of a successful attack on the kernel. We are exploring several possible implementations with the goal of increasing security while minimizing the impact on performance.

Date

22 May 2019

Publication

SYSTOR 2019

Authors

Share