Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/ARES.2011.116guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Enhancing Fuzzing Technique for OKL4 Syscalls Testing

Published: 22 August 2011 Publication History

Abstract

Virtual machine monitor is a hot topic in the embedded community. Apart from high end system, current processors for embedded systems do not have any instructions helping to virtualize an operating system. Based on this fact, most of the current hyper visors for embedded devices use the Para virtualization technique. This is the case of the OKL4 kernel which is based on the L4 micro-kernel and implements among other the Linux kernel as guest OS. We introduce our ongoing work for testing the security of OKL4. We have chosen to focus on the most low level OKL4 interface usable from an external actor: the system call API. Because all operating system components use directly or indirectly these system calls, a minor flaw at this level can impact in chain the entire system including a virtualized kernel. We have developed a model describing the OKL4 system calls. This model also contains all constraints applicable to a system call. Based on these models, we are working on a tool using the constraints to compute a reduced set of system call input values which are highly likely to generate flaws in OKL4 if they are not fully checked by the hypervisor.

Cited By

View all

Index Terms

  1. Enhancing Fuzzing Technique for OKL4 Syscalls Testing
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ARES '11: Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security
    August 2011
    772 pages
    ISBN:9780769544854

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 22 August 2011

    Author Tags

    1. Embedded System
    2. Kernel Security
    3. OKL4
    4. Syscalls
    5. Virtual Machine

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)WinkFuzz: Model-based Script Synthesis for FuzzingProceedings of the Third International Symposium on Advanced Security on Software and Systems10.1145/3591365.3592946(1-12)Online publication date: 10-Jul-2023
    • (2020)MedusaProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489293(1427-1444)Online publication date: 12-Aug-2020
    • (2018)When time meets testInternational Journal of Information Security10.5555/3268268.326829917:4(395-409)Online publication date: 1-Aug-2018
    • (2018)Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU FeaturesProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196508(587-600)Online publication date: 29-May-2018
    • (2017)IMFProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3134103(2345-2358)Online publication date: 30-Oct-2017
    • (2016)Coverage-directed differential testing of JVM implementationsACM SIGPLAN Notices10.1145/2980983.290809551:6(85-99)Online publication date: 2-Jun-2016
    • (2016)Coverage-directed differential testing of JVM implementationsProceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation10.1145/2908080.2908095(85-99)Online publication date: 2-Jun-2016

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media