Title
Sentry: A Binary-Level Interposition Mechanism for Trusted Kernel Extension
Abstract
Several commodity operating systems have used kernel extensions to extend or replace their functionalities. Generally, since the kernel extensions are executed in the same address space with the kernel, a mere fault in the extensions may lead the whole system to be corrupted. So naturally, studies on the kernel extension are mainly proposed with the goal of isolating extension faults from the system. However, previous schemes require the static analysis of the extension module and the modification of kernel source code. The goal of this paper is to remove such overhead stages. This paper proposes Sentry; a lightweight kernel subsystem that provides dependable execution environment for the kernel extensions. We show the efficiency of Sentry through practical implementation on Linux.
Year
DOI
Venue
2006
10.1109/CIT.2006.165
CIT
Keywords
Field
DocType
commodity operating system,kernel source code,isolating extension fault,address space,mere fault,lightweight kernel subsystem,trusted kernel extension,dependable execution environment,extension module,binary-level interposition mechanism,whole system,kernel extension,static analysis,source code,operating system,ground penetrating radar,operating systems,computer science,hardware,kernel
sysfs,Computer science,Hybrid kernel,Real-time computing,Kernel preemption,Configfs,Operating system,procfs,Kernel virtual address space,Giant lock,Distributed computing,Linux kernel
Conference
ISBN
Citations 
PageRank 
0-7695-2687-X
0
0.34
References 
Authors
7
4
Name
Order
Citations
PageRank
Se-Won Kim1163.04
Jaehyun Hwang212110.72
Jin-Hee Choi3515.87
Chuck Yoo49820.58