Detecting Stack based kernel Information leaks.
S. Peiró, M. Muñoz, M. Masmano, and A. Crespo.
Computational Intelligence in Security for Information Systems (CISIS14).
Keywords Security, Operating Systems, Information disclosure, Vulnerability, Static analysis.
The Linux kernel has become widely adopted in the mobile devices and cloud services,
parallel to this has grown its abuse and misuse by attackers and malicious users.
This has increased attention paid to kernel security through the deployment of
kernel protection mechanisms.
Kernel based attacks require reliability, kernel attack reliability is achieved
through the information gathering stage where the attacker is able to gather
enough information …