{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:00:06Z","timestamp":1742954406198,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819635306"},{"type":"electronic","value":"9789819635313"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_11","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:12:39Z","timestamp":1741867959000},"page":"213-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RKPM: Restricted Kernel Page Mechanism to\u00a0Mitigate Privilege Escalation Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2686-2541","authenticated-orcid":false,"given":"Hiroki","family":"Kuzuno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6226-5715","authenticated-orcid":false,"given":"Toshihiro","family":"Yamauchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"11_CR1","unstructured":"Exploit Database, Nexus 5 Android 5.0 - Privilege Escalation. https:\/\/www.exploit-db.com\/exploits\/35711\/. Accessed 21 May 2019"},{"key":"11_CR2","unstructured":"grsecurity: super fun 2.6.30+\/RHEL5 2.6.18 local kernel exploit. https:\/\/grsecurity.net\/~spender\/exploits\/exploit2.txt. Accessed 21 May 2019"},{"key":"11_CR3","doi-asserted-by":"publisher","unstructured":"Criswell, J., Dautenhahn, N., Adve, V.: KCoFI: Complete control-flow integrity for commodity operating system kernels. In: Proceedings of the IEEE Security and Privacy, pp. 292-307. IEEE (2014). https:\/\/doi.org\/10.1109\/SP.2014.26","DOI":"10.1109\/SP.2014.26"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 298-307, ACM (2004). https:\/\/doi.org\/10.1145\/1030083.1030124","DOI":"10.1145\/1030083.1030124"},{"key":"11_CR5","unstructured":"Intel Corporation.: Intel(R) 64 and IA-32 Architectures Software Developer\u2019s Manual. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html. Accessed 18 August 2021"},{"key":"11_CR6","doi-asserted-by":"publisher","unstructured":"Song, D., Lettner, J., Rajasekaran, P., Na, Y., Volckaert, S., Larsen, P., and Franz, M.: SoK: sanitizing for security. In: Proceedings of 2019 IEEE Symposium on Security and Privacy, pp. 1275-1295. IEEE (2019). https:\/\/doi.org\/10.1109\/SP.2019.00010","DOI":"10.1109\/SP.2019.00010"},{"key":"11_CR7","unstructured":"CVE-2017-16995. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-16995. Accessed 10 June 2019"},{"key":"11_CR8","doi-asserted-by":"publisher","unstructured":"Chen, H., Mao, Y., Wang, X., Zhow, D., Zeldovich, N., Kaashoek, F.M.: Linux kernel vulnerabilities - state-of-the-art defenses and open problems. In: Proceedings of the Second Asia-Pacific Workshop on Systems, pp. 1-5. ACM (2011). https:\/\/doi.org\/10.1145\/2103799.2103805","DOI":"10.1145\/2103799.2103805"},{"key":"11_CR9","unstructured":"The Linux Kernel Archives. https:\/\/www.kernel.org\/. Accessed 10 Jun 2019"},{"key":"11_CR10","unstructured":"CVE-2016-4997. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-4997. Accessed 10 Jun 2019"},{"key":"11_CR11","unstructured":"CVE-2016-9793. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-9793. Accessed 10 Jun 2019"},{"key":"11_CR12","unstructured":"CVE-2017-1000112. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-1000112. Accessed 10 Jun 2019"},{"key":"11_CR13","unstructured":"FreeBSD architecture handbook. https:\/\/www.freebsd.org\/doc\/en_US.ISO8859-1\/books\/arch-handbook\/. Accessed 8 August 2019"},{"key":"11_CR14","doi-asserted-by":"publisher","unstructured":"Nikolaev, R., Nadeem, H., Stone, C., Ravindran, B.: Adelie: continuous address space layout re-randomization for Linux drivers. In: Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 483\u2013498. ACM (2022). https:\/\/doi.org\/10.1145\/3503222.3507779","DOI":"10.1145\/3503222.3507779"},{"key":"11_CR15","doi-asserted-by":"publisher","unstructured":"Holmes, B., Waterman, J., Williams, D.: KASLR in the age of MicroVMs. In: Proceedings of the Seventeenth European Conference on Computer Systems, pp. 149-165. ACM (2022). https:\/\/doi.org\/10.1145\/3492321.3519578","DOI":"10.1145\/3492321.3519578"},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"3351","DOI":"10.1007\/s10207-024-00890-4","volume":"23","author":"H Kuzuno","year":"2024","unstructured":"Kuzuno, H., Yamauchi, T.: Mitigation of privilege escalation attack using kernel data relocation mechanism. Int. J. Inf. Secur. 23, 3351\u20133367 (2024). https:\/\/doi.org\/10.1007\/s10207-024-00890-4","journal-title":"Int. J. Inf. Secur."},{"key":"11_CR17","unstructured":"Yoo, S., Park, J., Kim, S., Kim, Y., Kim, T.: In-Kernel control-flow integrity on commodity OSes using ARM pointer authentication. In: Proceedings of the 31st USENIX Conference on Security Symposium, pp. 89-106. USENIX (2019)"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Sung, M., Olivier, P., Lankes, S., Ravindran, B.: Intra-unikernel isolation with intel memory protection keys. In: Proceedings of the 16th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments, pp. 143-156. ACM (2020). https:\/\/doi.org\/10.1145\/3381052.3381326","DOI":"10.1145\/3381052.3381326"},{"key":"11_CR19","doi-asserted-by":"publisher","unstructured":"Proskurin, S., Momeu, M., Ghavamnia, S., Kemerlis, P., V., Polychronakis, M.: xMP: selective memory protection for kernel and user space. In: Proceedings of the 2020 IEEE Symposium on Security and Privacy, pp. 563-577. IEEE (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00041","DOI":"10.1109\/SP40000.2020.00041"},{"key":"11_CR20","doi-asserted-by":"publisher","unstructured":"Lukas, M., Martin, S., Fabian, R., Daniel, G., Stefan, M.: DOPE: domain protection enforcement with PKS. In: Proceedings of the 39th Annual Computer Security Applications Conference, pp. 662\u2013676 (2023). https:\/\/doi.org\/10.1145\/3627106.3627113","DOI":"10.1145\/3627106.3627113"},{"key":"11_CR21","doi-asserted-by":"publisher","unstructured":"Silvestro, S., Liu, H., Crosser, C., Lin, Z., Liu, T.: FreeGuard: a faster secure heap allocator. In: Proceedings of the 24th ACM Conference on Computer and Communications Security, pp. 2389\u20132403. ACM (2017). https:\/\/doi.org\/10.1145\/3133956.3133957","DOI":"10.1145\/3133956.3133957"},{"key":"11_CR22","doi-asserted-by":"publisher","unstructured":"Chen, Q., Azab, A.M., Ganesh, G., Ning, P.: PrivWatcher: non-bypassable monitoring and protection of process credentials from memory corruption attacks. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 167-178. ACM (2017). https:\/\/doi.org\/10.1145\/3052973.3053029","DOI":"10.1145\/3052973.3053029"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"46584","DOI":"10.1109\/ACCESS.2018.2866498","volume":"6","author":"W Qiang","year":"2018","unstructured":"Qiang, W., Yang, J., Jin, H., Shi, X.: PrivGuard: protecting sensitive kernel data from privilege escalation attacks. IEEE Access 6, 46584\u201346594 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2866498","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:12:45Z","timestamp":1741867965000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}