Show simple item record

dc.contributor.authorKaashoek, M. Frans
dc.contributor.authorArnold, Jeffrey B.
dc.date.accessioned2010-02-11T15:27:18Z
dc.date.available2010-02-11T15:27:18Z
dc.date.issued2009
dc.date.submitted2009-04
dc.identifier.isbn978-1-60558-482-9
dc.identifier.urihttp://hdl.handle.net/1721.1/51698
dc.description.abstractKsplice allows system administrators to apply patches to their operating system kernels without rebooting. Unlike previous hot update systems, Ksplice operates at the object code layer, which allows Ksplice to transform many traditional source code patches into hot updates with little or no programmer involvement. In the common case that a patch does not change the semantics of persistent data structures, Ksplice can create a hot update without a programmer writing any new code. Security patches are one compelling application of hot updates. An evaluation involving all significant x86-32 Linux security patches from May 2005 to May 2008 finds that most security patches-56 of 64-require no new code to be performed as a Ksplice update. In other words, Ksplice can correct 88% of the Linux kernel vulnerabilities from this interval without the need for rebooting and without writing any new code. If a programmer writes a small amount of new code to assist with the remaining patches (about 17 lines per patch, on average), then Ksplice can apply all 64 of the security patches from this interval without rebooting.en
dc.language.isoen_US
dc.publisherAssociation for Computing Machineryen
dc.relation.isversionofhttp://dx.doi.org/10.1145/1519065.1519085en
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en
dc.sourceFrans Kaashoeken
dc.titleKsplice: Automatic Rebootless Kernel Updatesen
dc.typeArticleen
dc.identifier.citationArnold, Jeff, and M. Frans Kaashoek. “Ksplice: automatic rebootless kernel updates.” Proceedings of the 4th ACM European conference on Computer systems. Nuremberg, Germany: ACM, 2009. 187-198.en
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.approverKaashoek, M. Frans
dc.contributor.mitauthorKaashoek, M. Frans
dc.contributor.mitauthorArnold, Jeffrey B.
dc.relation.journalProceedings of the 4th ACM European conference on Computer systemsen
dc.eprint.versionAuthor's final manuscript
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen
eprint.statushttp://purl.org/eprint/status/PeerRevieweden
dspace.orderedauthorsArnold, Jeff; Kaashoek, M. Fransen
dc.identifier.orcidhttps://orcid.org/0000-0001-7098-586X
mit.licensePUBLISHER_POLICYen
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record