{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:39:01Z","timestamp":1759091941728,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T00:00:00Z","timestamp":1291593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,12,6]]},"DOI":"10.1145\/1920261.1920301","type":"proceedings-article","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T16:13:47Z","timestamp":1292861627000},"page":"271-280","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Analyzing and improving Linux kernel memory protection"],"prefix":"10.1145","author":[{"given":"Siarhei","family":"Liakh","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Michael","family":"Grace","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Xuxian","family":"Jiang","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2010,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A Look at ftrace. http:\/\/lwn.net\/Articles\/322666\/.  A Look at ftrace. http:\/\/lwn.net\/Articles\/322666\/."},{"key":"e_1_3_2_1_2_1","volume-title":"September","author":"Devices Advanced Micro","year":"2007","unstructured":"Advanced Micro Devices . AMD64 Architecture Programmer's Manual Volume 2: System Programming, 3.14 edition , September 2007 . Advanced Micro Devices. AMD64 Architecture Programmer's Manual Volume 2: System Programming, 3.14 edition, September 2007."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_4_1","volume-title":"Standard BIOS 32-bit Service Directory Proposal","author":"Block T. C.","year":"1993","unstructured":"T. C. Block . Standard BIOS 32-bit Service Directory Proposal . Phoenix Technologies Ltd ., 0.4 edition, June 1993 . T. C. Block. Standard BIOS 32-bit Service Directory Proposal. Phoenix Technologies Ltd., 0.4 edition, June 1993."},{"key":"e_1_3_2_1_5_1","volume-title":"Understanding The Linux Kernel. Oreilly &amp","author":"Bovet D.","year":"2005","unstructured":"D. Bovet and M. Cesati . Understanding The Linux Kernel. Oreilly &amp ; Associates Inc ., third edition, 2005 . D. Bovet and M. Cesati. Understanding The Linux Kernel. Oreilly &amp; Associates Inc., third edition, 2005."},{"key":"e_1_3_2_1_6_1","volume-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI'08: Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI'08: Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation , Dec. 2008 . C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI'08: Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, Dec. 2008."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586142"},{"key":"e_1_3_2_1_8_1","volume-title":"Setuid Demystified. In Security '02: Proceedings of the 11th Conference on USENIX Security Symposium","author":"Chen H.","year":"2002","unstructured":"H. Chen , D. Wagner , and D. Dean . Setuid Demystified. In Security '02: Proceedings of the 11th Conference on USENIX Security Symposium , 2002 . H. Chen, D. Wagner, and D. Dean. Setuid Demystified. In Security '02: Proceedings of the 11th Conference on USENIX Security Symposium, 2002."},{"key":"e_1_3_2_1_9_1","volume-title":"IA-32 Intel Architecture Software Developer's Manual","author":"I. Corporation","year":"2006","unstructured":"I. Corporation . IA-32 Intel Architecture Software Developer's Manual Volume 3A: System Programming Guide, Part 1 . Intel Corp., 2006 . Publication number 253668. I. Corporation. IA-32 Intel Architecture Software Developer's Manual Volume 3A: System Programming Guide, Part 1. Intel Corp., 2006. Publication number 253668."},{"key":"e_1_3_2_1_10_1","unstructured":"D. L. Dill. The Murphi Verification System. http:\/\/eprints.kfupm.edu.sa\/70602\/1\/70602.pdf 1996.  D. L. Dill. The Murphi Verification System. http:\/\/eprints.kfupm.edu.sa\/70602\/1\/70602.pdf 1996."},{"key":"e_1_3_2_1_11_1","volume-title":"June","author":"Franklin J.","year":"2008","unstructured":"J. Franklin , A. Seshadri , N. Qu , S. Chaki , and A. Datta . Attacking, Repairing, and Verifying SecVisor: A Retrospective on the Security of a Hypervisor Research Area. Technical report , June 2008 . J. Franklin, A. Seshadri, N. Qu, S. Chaki, and A. Datta. Attacking, Repairing, and Verifying SecVisor: A Retrospective on the Security of a Hypervisor Research Area. Technical report, June 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_13_1","volume-title":"Understanding The Linux Virtual Memory Manager","author":"Gorman M.","year":"2004","unstructured":"M. Gorman . Understanding The Linux Virtual Memory Manager . Prentice Hall , May 2004 . M. Gorman. Understanding The Linux Virtual Memory Manager. Prentice Hall, May 2004."},{"key":"e_1_3_2_1_14_1","volume-title":"Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. In Security '09: Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association","author":"Hund R.","year":"2009","unstructured":"R. Hund , T. Holz , and F. Freiling . Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. In Security '09: Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association , 2009 . R. Hund, T. Holz, and F. Freiling. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. In Security '09: Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association, 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_16_1","unstructured":"The Linux Kernel Archives. http:\/\/www.kernel.org.  The Linux Kernel Archives. http:\/\/www.kernel.org."},{"key":"e_1_3_2_1_17_1","volume-title":"{1\/4, tip:x86\/mm} correcting improper large page preservation. https:\/\/patchwork.kernel.org\/patch\/90045\/","author":"Liakh S.","year":"2010","unstructured":"S. Liakh and X. Jiang . {1\/4, tip:x86\/mm} correcting improper large page preservation. https:\/\/patchwork.kernel.org\/patch\/90045\/ , 2010 . S. Liakh and X. Jiang. {1\/4, tip:x86\/mm} correcting improper large page preservation. https:\/\/patchwork.kernel.org\/patch\/90045\/, 2010."},{"key":"e_1_3_2_1_18_1","volume-title":"{2\/4, tip:x86\/mm} set first mb as rw+nx. https:\/\/patchwork.kernel.org\/patch\/90048\/","author":"Liakh S.","year":"2010","unstructured":"S. Liakh and X. Jiang . {2\/4, tip:x86\/mm} set first mb as rw+nx. https:\/\/patchwork.kernel.org\/patch\/90048\/ , 2010 . S. Liakh and X. Jiang. {2\/4, tip:x86\/mm} set first mb as rw+nx. https:\/\/patchwork.kernel.org\/patch\/90048\/, 2010."},{"key":"e_1_3_2_1_19_1","volume-title":"{3\/4, tip:x86\/mm} nx protection for kernel data. https:\/\/patchwork.kernel.org\/patch\/90046\/","author":"Liakh S.","year":"2010","unstructured":"S. Liakh and X. Jiang . {3\/4, tip:x86\/mm} nx protection for kernel data. https:\/\/patchwork.kernel.org\/patch\/90046\/ , 2010 . S. Liakh and X. Jiang. {3\/4, tip:x86\/mm} nx protection for kernel data. https:\/\/patchwork.kernel.org\/patch\/90046\/, 2010."},{"key":"e_1_3_2_1_20_1","volume-title":"{4\/4, tip:x86\/mm} ro\/nx protection for loadable kernel modules. https:\/\/patchwork.kernel.org\/patch\/90047\/","author":"Liakh S.","year":"2010","unstructured":"S. Liakh and X. Jiang . {4\/4, tip:x86\/mm} ro\/nx protection for loadable kernel modules. https:\/\/patchwork.kernel.org\/patch\/90047\/ , 2010 . S. Liakh and X. Jiang. {4\/4, tip:x86\/mm} ro\/nx protection for loadable kernel modules. https:\/\/patchwork.kernel.org\/patch\/90047\/, 2010."},{"key":"e_1_3_2_1_21_1","volume-title":"LEET '09: Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats","author":"Michalis Polychronakis E. P. M.","year":"2009","unstructured":"E. P. M. Michalis Polychronakis , Kostas G. Anagnostakis . An Empirical Study of Real-world Polymorphic Code Injection Attacks . In LEET '09: Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats . Usenix Association , April 2009 . E. P. M. Michalis Polychronakis, Kostas G. Anagnostakis. An Empirical Study of Real-world Polymorphic Code Injection Attacks. In LEET '09: Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats. Usenix Association, April 2009."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267549.1267565"},{"key":"e_1_3_2_1_23_1","unstructured":"A. Nayani M. Gorman and R. S. de Castro. Memory Management in Linux - Desktop Companion to the Linux Source Code. http:\/\/www.ecsl.cs.sunysb.edu\/elibrary\/linux\/mm\/mm.pdf May 2002.  A. Nayani M. Gorman and R. S. de Castro. Memory Management in Linux - Desktop Companion to the Linux Source Code. http:\/\/www.ecsl.cs.sunysb.edu\/elibrary\/linux\/mm\/mm.pdf May 2002."},{"key":"e_1_3_2_1_24_1","unstructured":"PaX ASLR. http:\/\/pax.grsecurity.net\/docs\/aslr.txt.  PaX ASLR. http:\/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_25_1","unstructured":"PaX NOEXEC. http:\/\/pax.grsecurity.net\/docs\/noexec.txt.  PaX NOEXEC. http:\/\/pax.grsecurity.net\/docs\/noexec.txt."},{"key":"e_1_3_2_1_26_1","volume-title":"August","author":"PCI Special Interest Group","year":"1994","unstructured":"PCI Special Interest Group . PCI BIOS Specification, 2.1 edition , August 1994 . PCI Special Interest Group. PCI BIOS Specification, 2.1 edition, August 1994."},{"key":"e_1_3_2_1_27_1","volume-title":"HP Laboratories","author":"Pearson S.","year":"2002","unstructured":"S. Pearson . Trusted Computing Platforms, the Next Security Solution. Technical report , HP Laboratories , November 2002 . S. Pearson. Trusted Computing Platforms, the Next Security Solution. Technical report, HP Laboratories, November 2002."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006.1433008"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.39"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294294"},{"key":"e_1_3_2_1_31_1","unstructured":"J. Tombs B. Smith R. Grehan T. Yager D. C. Niemi and I. Smith. Unixbench-5.1.2. http:\/\/code.google.com\/p\/byte-unixbench\/.  J. Tombs B. Smith R. Grehan T. Yager D. C. Niemi and I. Smith. Unixbench-5.1.2. http:\/\/code.google.com\/p\/byte-unixbench\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Ubuntu. http:\/\/www.ubuntu.com\/.  Ubuntu. http:\/\/www.ubuntu.com\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Red Hat Magazine","author":"van de Ven A.","year":"2005","unstructured":"A. van de Ven . Limiting Buffer Overflows with ExecShield . Red Hat Magazine , July 2005 . A. van de Ven. Limiting Buffer Overflows with ExecShield. Red Hat Magazine, July 2005."},{"key":"e_1_3_2_1_34_1","volume-title":"OSDI'04: Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation","author":"Yang J.","year":"2004","unstructured":"J. Yang , P. Twohey , D. Engler , and M. Musuvathi . Using Model Checking to Find Serious File System Errors . In OSDI'04: Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation , 2004 . J. Yang, P. Twohey, D. Engler, and M. Musuvathi. Using Model Checking to Find Serious File System Errors. In OSDI'04: Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation, 2004."}],"event":{"name":"ACSAC '10: 2010 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Austin Texas USA","acronym":"ACSAC '10"},"container-title":["Proceedings of the 26th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1920261.1920301","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1920261.1920301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:43Z","timestamp":1750244383000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1920261.1920301"}},"subtitle":["a model checking approach"],"short-title":[],"issued":{"date-parts":[[2010,12,6]]},"references-count":34,"alternative-id":["10.1145\/1920261.1920301","10.1145\/1920261"],"URL":"https:\/\/doi.org\/10.1145\/1920261.1920301","relation":{},"subject":[],"published":{"date-parts":[[2010,12,6]]},"assertion":[{"value":"2010-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}