kMVX : Detecting Kernel Information Leaks with Multi-variant Execution
- Submitting institution
-
The University of Manchester
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 158469205
- Type
- E - Conference contribution
- DOI
-
10.1145/3297858.3304054
- Title of conference / published proceedings
- ASPLOS '19: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems
- First page
- 559
- Volume
- -
- Issue
- -
- ISSN
- -
- Open access status
- -
- Month of publication
- April
- Year of publication
- 2019
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
5
- Research group(s)
-
A - Computer Science
- Citation count
- 0
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- "Multi-Variant eXecution (MVX) is a widely used technique for detecting malicious code exploits. This paper is the first work to demonstrate MVX at the kernel level.
It is part of an international collaboration between Virginia Tech (Olivier) and Herbert Bos'' leading system security research group from TU Vrije in Amsterdam.
ASPLOS 2019 has 74/350 accepted (21% ) in 2019.
This work is cited in papers from prestigious conferences such as ACM CCS."
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -