Safe kernel programming in the OKE
2003Vol. 1653, pp. 141–152
Citations Over TimeTop 10% of 2003 papers
Abstract
This paper describes the implementation of the OKE, which allows users other than root to load native and fully optimised code in the Linux kernel. Safety is guaranteed by trust management, language customisation and a trusted compiler. By coupling trust management with the compiler, the OKE is able to vary the level of restrictions on the code running in the kernel, depending on the programmer's privileges. Static sandboxing is used as much as possible to check adherence to the security policies at compile time.
Related Papers
- → Reverse interpretation + mutation analysis = automatic retargeting(1997)5 cited
- → Reverse interpretation + mutation analysis = automatic retargeting(1997)19 cited
- → Code generation for the AT&T DSP32(2002)5 cited
- A Compiler for Application-Specific Signal Processors(1989)
- → Compilers, Interpreters and Assemblers(1985)