Safe kernel programming in the OKE

H. Bos, B. Samwel

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

This paper describes the implementation of the OKE, which allows users other than root to load native and fully optimised code in the Linux kernel. Safety is guaranteed by trust management, language customisation and a trusted compiler. By coupling trust management with the compiler, the OKE is able to vary the level of restrictions on the code running in the kernel, depending on the programmer's privileges. Static sandboxing is used as much as possible to check adherence to the security policies at compile time.

Original languageEnglish
Title of host publication2002 IEEE Open Architectures and Network Programming Proceedings, OPENARCH 2002
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages141-152
Number of pages12
ISBN (Electronic)0780374576, 9780780374577
DOIs
Publication statusPublished - 1 Jan 2002
EventIEEE Open Architectures and Network Programming, OPENARCH 2002 - New York, United States
Duration: 29 Jun 2002 → …

Conference

ConferenceIEEE Open Architectures and Network Programming, OPENARCH 2002
Country/TerritoryUnited States
CityNew York
Period29/06/02 → …

Fingerprint

Dive into the research topics of 'Safe kernel programming in the OKE'. Together they form a unique fingerprint.

Cite this