Ciena Acronyms Guide.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Ciena Acronyms Guide.Pdf The Acronyms Guide edited by Erin Malone Chris Janson 1st edition Publisher Acknowledgement: This is the first edition of this book. Please notify us of any acronyms we may have missed by submitting them via the form at www.ciena.com/acronymsguide. We will be happy to include them in further editions of “The Acronyms Guide”. For additional information on Ciena’s Carrier Ethernet or Optical Communications Certification programs please contact [email protected]. Table of Contents Numerics ..........................1 A .......................................1 B .......................................2 C .......................................3 D .......................................5 E .......................................7 F........................................9 G .....................................10 H .....................................11 I .......................................12 J ......................................14 K .....................................14 L ......................................14 M ....................................15 N .....................................17 O.....................................18 P .....................................20 Q.....................................22 R .....................................22 S......................................23 T .....................................26 U .....................................28 V .....................................29 W ....................................29 X .....................................30 Z......................................30 Acronym Guide ADI Asset Distribution Interface Numerics ADM Add/Drop Multiplexer 2F Two-Fiber ADP Actual Departure Potential; Automatic 10 GbE 10 Gigabit Ethernet Data Processing ADSL 10 GFC 10 Gigabit Fibre Channel (Same as Asymmetric Digital Subscriber Line FC1200) ADT Actual Departure Time; Automatic Data 100G 100 Gigabits Transmission AE 16-QAM 16 (points) Quadrature Amplitude Automation Engine; Automation Envi- Modulation ronment AES 3D Three Dimensional Advanced Encryption Standard; Application Environment Specific 3G 3rd Generation AESA ATM End System Address; ATM End 40G 40 Gigabits Station Address 4C Consortium of Intel, IBM, Matsushita, AFI Authority and Format Identifier and Toshiba AFM APS Mode Mismatch Failure 4F Four-Fiber AGC Automatic Gain Control; Access Group 5C Consortium of Intel, Sony, Matsushita, Controller Toshiba, and Hitachi AGGR Aggregate A AID Access Identifier; Application Identifier A/D Analog-to-Digital AIM Auto Image Management; Active AAL ATM Adaptation Layer Inventory Map AAL0 ATM Adaptation Layer Type 0 AIN Advanced Intelligent Network AAL1 ATM Adaptation Layer Type 1 AINI ATM Inter-Network Interface AAL2 ATM Adaptation Layer 2 Transport AINS Automatic in Service State AAL3/4 ATM Adaptation Layer Type 3 and 4 AIR Additive Increase Rate AAL5 ATM Adaptation Layer 5 AIS Alarm Indication Signal ABR Available Bit Rate AISDP Alarm Indication Signal Decay Period ABT Advanced BiCMOS Technology AISIP Alarm Indication Signal Integration AC Alternating Current; Administrative Period Complex; Atomic Clock AIS-L Alarm Indication Signal - Line AC-3 Audio Coding Revision 3 AIS-P Alarm Indication Signal - Path ACAC Actual Call Admission Control AIS-S Alarm Indication Signal - Section ACEG Alternating Current Equipment Ground AIS-V VT Alarm Indication Signal ACK Acknowledge ALS Automatic Laser Shutdown; Application ACL Active Control List; Access Control List Layer Service ACO Alarm Cutoff AM Amplitude Modulation; Application ACQ Acquire Manager ACR Allowed Cell Rate AMF APS Mode Mismatch Failure ACS Automatic Channel Shutdown; Alarm AMI Access Method Interface; Alternate Correlation and Suppression Mark Inversion ACSE Association Control Service Element AMP Amplifier; Amperes ACSS Automatic Channel Shutdown AMS Asset Management System; Agent Suppression; Automatic Channel Management System Shutdown State ANSI American National Standards Institute ACT Active AO Autonomous Output ADC Analog-to-Digital Converter; Add/Drop AOD Advertising on Demand Coupler APC Angled Physical Contact 1 APD Avalanche PhotoDiode AU-n Administrative Unit n API Application Program Interface AUX Auxiliary APS Automatic Protection Switching AVC Attribute Value Change APSBF Automatic Protection Switching Byte AWG American Wire Gauge Failure AWGN Additive White Gaussian Noise APSCM Automatic Protection Switching Channel Mismatch B APSMM Automatic Protection Switching Mode Mismatch B/P Backplane ARC Alarm Reporting Control B3ZS Bipolar With 3-Zero Substitution ARP Address Resolution Protocol B6ZS Bipolar With 6-Zero Substitution ARPU Average Revenue per Unit (or User) B8ZS Bipolar With 8-Zero Substitution AS Autonomous System BA Booster Amplifier ASAP Alarm Severity Assignment Profile BB Broadband ASCII American Standard Code for Informa- BBE Background Block Error tion Interchange BBER Background Block Error Ratio ASD Access Security Device BBE-RS Background Block Error Regenerator ASE Amplified Spontaneous Emission; Ap- Section (an SDH regenerator section plication Service Element error) ASI Asynchronous Serial Interface; BC Business Continuity; Broadcast Asynchronous SCSI Interface BCD Binary-Coded Decimal ASIC Application-Specific Integrated Circuit BCST Broadcast ASN.1 Abstract Syntax Notation One B-DCS Broadband Digital Cross-connect ASP Applications Service Provider; Average System Selling Price BDFB Battery Distribution Fuse Bay; Battery ASYNC Asynchronous Distribution Fuse Board AT Advanced Technology BE Block Error; Best Effort AT&T American Telephone and Telegraph BECN Backward Explicit Congestion Notifica- Company tion ATA Advanced Technology Attachment BELLCORE BELL Communications Research, Inc. ATAF ATM Test Access Function BER Bit Error Rate ATAG Autonomous Tag BE-RS Block Errors-Regenerative Section ATAGSEQ Autonomous Tag Sequence BER-SD-P Path Signal Degrade BER ATC Alarm Traffic Controller BER-SF-P Path Signal Failure BER ATDMA Asynchronous Time Division Multiple BERT Bit Error Rate Test Access BFP Back Facet Power; Basic Format Packet A-TDMA Advanced Time Division Multiple BGP Border Gateway Protocol Access BGP4 Border Gateway Protocol, version 4 ATM Asynchronous Transfer Mode BICI Broadband Inter-Carrier Interfaces; ATM SAM ATM Service Access Multiplexer B-ISDN Inter-carrier Interface ATMVCL ATM Virtual Channel Link BICSI Building Industry Consulting Services ATMVPL ATM Virtual Path Link International ATTN Attenuator BIOS Basic Input/Output System AU/AU-x Administrative Unit BIP Bit Interleaved Parity; Breaker Interface Panel AUG Administrative Unit Group B-ISDN Broadband ISDN AUI Autonomous Unit Interface 2 BIT Built-In Test; Binary Digit CA Content Archived; Carrier Access BITS Building Integrated Timing System CAB Conformity Assessment Body bits/sym Bits per Symbol CAC Connection Admission Control; Call BLSR Bidirectional Line Switched Ring Admission Control BML Business Management Layer CAD Computer Aided Design BNC Bayonet Neill-Concelman British CALA Central America and Latin America National Connector CAM Content Addressable Memory BOC Bell Operating Company CANARIE Canadian Network for Advancement of BOD Bandwidth on Demand Research BOL Beginning of Life CAP Competitive Access Provider BOM Bill of Materials CAPEX Capital Expenditure BONDING Bandwidth ON Demand CAS Channel Associated Signaling Interoperability Group CATV Community Antenna Television; Cable BOOTP Bootstrap Protocol Television BP Backplane CB, C/B Circuit Breaker BPI Baseline Privacy Interface CBDS Connectionless Broadband Data Service BPI+ Baseline Privacy Interface Plus CBN Common Bonding Network B-PON Broadband Passive Optical Network CBR Constant Bit Rate BPP Backplane Protocol CC Cross Connection; Clear Channel; bps bits per second Calling Centers BPSR Bidirectional Path Switched Ring CCAF Call Control Agent Function, IN block BPT Band Pass-Through CCB Configuration Control Board BPV BiPolar Violations CCC Cross Connect Controller B-RAS Broadband Remote Access Server CCC768 Cross Connect Fabric with 768x768 BRI Basic Rate Interface STS-1 capacity BRM Backward RM CCCG Cross Connection and Control Group BSC Board SC Connector CCC-PC CCC Processor Card BSP Board Support Package CCDF Complementary Cumulative BSS Business Support System Distribution Function BT British Telecom; Burst Tolerance CCI Content Control Information Btag Beginning Tag CCITT Consultative Committee on Interna- tional Telegraphy and Telephony BTM Bits Termination Circuit Pack CCK Complimentary Code Keying BTO Build Transfer Operate CCW Counterclockwise BTS Business Telecom Services CDE Common Desktop Environment (UNIX) BTU/hr British Thermal Unit per hour CDMA Code Division Multiple Access BW Bandwidth CDP Contracted Deadline Potential BWDM Band Wavelength Division Multiplexer CDR Call Detail Recording; Clock and Data BYT Total Byte Count Recovery CD-ROM Compact Disc Read Only Memory C CDT Connection Dropping Threshold C Celsius; Critical CDTS Chromatic Dispersion Test Set C/I Carrier-to-Interface Ratio CDV Cell Delay Variation C/N Carrier-to-Noise Ratio CDVT Cell Delay Variation Tolerance C2O Cable to Optic CD-WO Compact Disc - Write One 3 CE Consumer Electronics CME Compressed Multiplication Equipment CEA Consumer Electronics Association CMF Channel Mismatch Failure; Client CELP Code Excited Linear Predictive Management Frame CER Cell Error Ratio; Codeword Error Ration CMIP Common Management Information Protocol CES Circuit Emulation Service CMIS Common Management Information CEV Controlled Environmental Vault Services CFDM Command
Recommended publications
  • Allgemeines Abkürzungsverzeichnis
    Allgemeines Abkürzungsverzeichnis L.
    [Show full text]
  • INTRODUCTION Client
    1 INTRODUCTION Client Server Network Fig. 1-1. A network with two clients and one server. Client machine Server machine Request Network Reply Client process Server process Fig. 1-2. The client-server model involves requests and replies. Fig. 1-3. In a peer-to-peer system there are no fixed clients and servers. 2222222222222222222222222222222222222222222222222222222222222222222222222222222 21 222222222222222222222222222222222222222222222222222222222222222222222222222222Tag1 Full name1 Example 1 1 1 1 1 12222222222222222222222222222222222222222222222222222222222222222222222222222222B2C1 Business-to-consumer1 Ordering books on-line 1 21 222222222222222222222222222222222222222222222222222222222222222222222222222222B2B1 Business-to-business1 Car manufacturer ordering tires from supplier 1 21 222222222222222222222222222222222222222222222222222222222222222222222222222222G2C1 Government-to-consumer1 Government distributing tax forms electronically 1 1 1 1 1 12222222222222222222222222222222222222222222222222222222222222222222222222222222C2C1 Consumer-to-consumer1 Auctioning second-hand products on line 1 21 222222222222222222222222222222222222222222222222222222222222222222222222222222P2P1 Peer-to-peer1 File sharing 1 Fig. 1-4. Some forms of e-commerce. 22222222222222222222222222222222222222222222222222222222222222 222222222222222222222222222222222222222222222222222222222222221 Wireless1 Mobile1 Applications 1 1 1 1 1 122222222222222222222222222222222222222222222222222222222222222No1 No1 Desktop computers in offices 1 222222222222222222222222222222222222222222222222222222222222221
    [Show full text]
  • ZN1A-M4 M6DTFN3 Specifications
    ganzsecurity.com 1080p & 5 MP IR IP Mini Domes w/ GXi Embedded Intelligence ZN1A-M4DTFN3 / M6DTFN3 Features: • 1080p & 5 Megapixel @ 30fps • VCA Technology Video Analytics Network Devices • 1/2.8” SONY STARVIS Exmor Sensor • Superior Low Light Performance • True Day / Night and WDR • SMART Bitrate Control & Region of Interest • 2.8mm Fixed Lens • 2 IR LEDs up to 59’ Range ganzsecurity.com ZN1A-M4/6DTFN3 1080p & 5MP IR IP Mini Domes w/ GXi Embedded Intelligence Specifications (Part 1) Model ZN1A-M4DTFN3 ZN1A-M6DTFN3 Image Sensor 1/2.8” SONY STARVIS Exmor 2.13MP CMOS 1/2.8” SONY STARVIS Exmor 5MP CMOS Effective Pixels 1920 x 1080 2592 x 1944 Scanning System Progressive scanning AGC Control Auto Iris Type Auto-Iris Minimum Illumination Color: 0.03 Lux (DSS on) / B/W : 0 Lux (IR on) Camera Lens 2.8mm, F2.0 Fixed Lens Angle of View Horizontal: Approx. 115° / Vertical Approx. 64° Shutter Speed Automatic / Manual: 1/30 ~ 1/32,000, Anti-Flicker, Slow Shutter (1/2, 1/3, 1/5, 1/6, 1/7.5, 1/10) Day/Night Performance True Day / Night (ICR) Wide Dynamic Range True WDR, 120dB S/N Ratio 50 dB Video Compression H.265, H.264 Baseline, Main, High profile, MJPEG (Motion JPEG) Multiple Profile 2592 x 1944 @30fps & 480 @30 fps 1080p @30fps & D1(704x480 or 704x576) @30fps Streaming Performance with H.264, H265 & MJPEG with H.264, H.265 & MJPEG Max Resolution 1920 x 1080 2592 x 1944 Video Bit Rate 100Kbps ~ 10Mbps Multi-rate for Preview and Recording Video Bit Rate Control Multi Streaming CBR/VBR @ H.264 (Controllable frame rate and Bandwidth) Digital Noise
    [Show full text]
  • Network Reliability and Fault Tolerance
    Network Reliability and Fault Tolerance Muriel Medard´ [email protected] Laboratory for Information and Decision Systems Room 35-212 Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA 02139 Steven S. Lumetta [email protected] Coordinated Science Laboratory University of Illinois Urbana-Champaign 1308 W. Main Street, Urbana, IL 61801 1 Introduction The majority of communications applications, from cellular telephone conversations to credit card transactions, assume the availability of a reliable network. At this level, data are expected to tra- verse the network and to arrive intact at their destination. The physical systems that compose a network, on the other hand, are subjected to a wide range of problems, ranging from signal distor- tion to component failures. Similarly, the software that supports the high-level semantic interface 1 often contains unknown bugs and other latent reliability problems. Redundancy underlies all ap- proaches to fault tolerance. Definitive definitions for all concepts and terms related to reliability, and, more broadly, dependability, can be found in [AAC+92]. Designing any system to tolerate faults first requires the selection of a fault model, a set of possible failure scenarios along with an understanding of the frequency, duration, and impact of each scenario. A simple fault model merely lists the set of faults to be considered; inclusion in the set is decided based on a combination of expected frequency, impact on the system, and feasibility or cost of providing protection. Most reliable network designs address the failure of any single component, and some designs tolerate multiple failures. In contrast, few attempt to handle the adversarial conditions that might occur in a terrorist attack, and cataclysmic events are almost never addressed at any scale larger than a city.
    [Show full text]
  • Networking Standards Mark Davies, Digital Equipment Corporation
    N92-12499 Networking Standards Mark Davies, Digital Equipment Corporation ABSTRACT The enterprise network is currently a multivendor environment consisting of many defacto and proprietary standards. During the 1990s, these networks will evolve towards networks which are based on international standards in both the LAN and WAN space. Also, you can expect to see the higher level functions and applications begin the same transition. The Open Network Advantage Market Requirements OPEN NETWORKS!!! Multi-protocol, multi-platform, multi-vendor networks working together International AND defacto standards Effortless communications within and between enter- prises Ability to move to standards at own pace What is an Open System? Defined as: A vendor-neutral computing environment: - compliant with International and defacto standards - permits system and network interoperability or software applications portability - includes consistency of data and human access - satisfies one or more of a business's functional requirements Standards Benefits from networks based on international and defacto standards o Vendor independence o Applications portability o Investment protection o Improved communications leading to increased productivity o Network flexibility 13DSDDED Network Architectures: DECnet, OSI, TCP/IP DECnet OS) IP Application Application Internet Applications Protocols Presentation DMA Session Control Session Transport Transport Transport (NSP) (TP 0,2,4) (TCP / UDP) Network Network Network (CLNS) (CLNS/CONS) (IP) Data Link Data Link Data Link
    [Show full text]
  • Memory Protection in Embedded Systems Lanfranco Lopriore Dipartimento Di Ingegneria Dell’Informazione, Università Di Pisa, Via G
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Archivio della Ricerca - Università di Pisa Memory protection in embedded systems Lanfranco Lopriore Dipartimento di Ingegneria dell’Informazione, Università di Pisa, via G. Caruso 16, 56126 Pisa, Italy E-mail: [email protected] Abstract — With reference to an embedded system featuring no support for memory manage- ment, we present a model of a protection system based on passwords and keys. At the hardware level, our model takes advantage of a memory protection unit (MPU) interposed between the processor and the complex of the main memory and the input-output devices. The MPU sup- ports both concepts of a protection context and a protection domain. A protection context is a set of access rights for the memory pages; a protection domain is a set of one or more protection contexts. Passwords are associated with protection domains. A process that holds a key match- ing a given password can take advantage of this key to activate the corresponding domain. A small set of protection primitives makes it possible to modify the composition of the domains in a strictly controlled fashion. The proposed protection model is evaluated from a number of salient viewpoints, which include key distribution, review and revocation, the memory requirements for storage of the information concerning protection, and the time necessary for key validation. Keywords: access right; embedded system; protection; revocation. 1. INTRODUCTION We shall refer to a typical embedded system architecture featuring a microprocessor inter- facing both volatile and non-volatile primary memory devices, as well as a variety of input/out- put devices including sensors and actuators.
    [Show full text]
  • Decnet-Plusftam and Virtual Terminal Use and Management
    VSI OpenVMS DECnet-Plus FTAM and Virtual Terminal Use and Management Document Number: DO-FTAMMG-01A Publication Date: June 2020 Revision Update Information: This is a new manual. Operating System and Version: VSI OpenVMS Integrity Version 8.4-2 VSI OpenVMS Alpha Version 8.4-2L1 VMS Software, Inc., (VSI) Bolton, Massachusetts, USA DECnet-PlusFTAM and Virtual Terminal Use and Management Copyright © 2020 VMS Software, Inc. (VSI), Bolton, Massachusetts, USA Legal Notice Confidential computer software. Valid license from VSI required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for VSI products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. VSI shall not be liable for technical or editorial errors or omissions contained herein. HPE, HPE Integrity, HPE Alpha, and HPE Proliant are trademarks or registered trademarks of Hewlett Packard Enterprise. Intel, Itanium and IA-64 are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group. The VSI OpenVMS documentation set is available on DVD. ii DECnet-PlusFTAM and Virtual
    [Show full text]
  • Database Language SQL: Integrator of CALS Data Repositories
    Database Language SQL: Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Information Systems Engineering Division Computer Systems Laboratory Gaithersburg, MD 20899 NIST Database Language SQL Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Information Systems Engineering Division Computer Systems Laboratory Gaithersburg, MD 20899 September 1992 U.S. DEPARTMENT OF COMMERCE Barbara Hackman Franklin, Secretary TECHNOLOGY ADMINISTRATION Robert M. White, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director Database Language SQL: Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan National Institute of Standards and Technology Information Systems Engineering Division Gaithersburg, MD 20899, USA CALS Status Report on SQL and RDA - Abstract - The Computer-aided Acquisition and Logistic Support (CALS) program of the U.S. Department of Defense requires a logically integrated database of diverse data, (e.g., documents, graphics, alphanumeric records, complex objects, images, voice, video) stored in geographically separated data banks under the management and control of heterogeneous data management systems. An over-riding requirement is that these various data managers be able to communicate with each other and provide shared access to data and
    [Show full text]
  • The Role of Emerging Broadband Technologies on the Converged
    The Role of Emerging Broadband Technologies on the Converged Packet-Based Network Introduction The vision of network convergence toward a consolidated packet-based network has been discussed for years, though it is still not a reality. Currently, there are numerous overlay networks such as IP, ATM, FR, Ethernet, SONET, DWDM and wireless for different services. The evolution pace toward convergence has been slow due to economic, technical and regulatory issues. However, the fact is that data traffic volume is now surpassing voice traffic volume. Traditional TDM voice traffic is moving to IP packets and TDM private line is moving to Ethernet private line. The wave of broadband applications such as Internet access, VOD, and IPTV create high bandwidth requirements for the network. These applications are packet-based, but have a much lower margin of profit for the service providers when compared to traditional voice service. Today’s overlay and traditional circuit-based infrastructure will become less optimal for the new packet-based services as the profit margin decreases. Most of the wireless networks in North America today are still circuit-based because most of the current wireless service is still voice-based. However, with emerging wireless access technologies such as WiMAX and Wi-Fi, more broadband wireless data and video services can be deployed. As a result, the wireless core network evolves toward a packet-based network. Service offerings drive network evolution. As more packet-based broadband services are launched and bundled together in service offerings, service providers start to add more packet-aware features into their current network components.
    [Show full text]
  • Application Layer
    APPLICATION LAYER The application layer in the OSI model is the closest layer to the end user which means that the application layer and end user can interact directly with the software application. The application layer programs are based on client and servers. The Application layer includes the following functions: • Identifying communication partners: The application layer identifies the availability of communication partners for an application with data to transmit. • Determining resource availability: The application layer determines whether sufficient network resources are available for the requested communication. • Synchronizing communication: All the communications occur between the applications requires cooperation which is managed by an application layer. Services of Application Layers o Network Virtual terminal: An application layer allows a user to log on to a remote host. To do so, the application creates a software emulation of a terminal at the remote host. The user's computer talks to the software terminal, which in turn, talks to the host. The remote host thinks that it is communicating with one of its own terminals, so it allows the user to log on. o File Transfer, Access, and Management (FTAM): An application allows a user to access files in a remote computer, to retrieve files from a computer and to manage files in a remote computer. FTAM defines a hierarchical virtual file in terms of file structure, file attributes and the kind of operations performed on the files and their attributes. o Addressing: To obtain communication between client and server, there is a need for addressing. When a client made a request to the server, the request contains the server address and its own address.
    [Show full text]
  • Congestion Control in Resilient Packet Ring Networks
    New Jersey Institute of Technology Digital Commons @ NJIT Dissertations Electronic Theses and Dissertations Fall 1-31-2005 Congestion control in resilient packet ring networks Alharbi Fahd New Jersey Institute of Technology Follow this and additional works at: https://digitalcommons.njit.edu/dissertations Part of the Electrical and Electronics Commons Recommended Citation Fahd, Alharbi, "Congestion control in resilient packet ring networks" (2005). Dissertations. 670. https://digitalcommons.njit.edu/dissertations/670 This Dissertation is brought to you for free and open access by the Electronic Theses and Dissertations at Digital Commons @ NJIT. It has been accepted for inclusion in Dissertations by an authorized administrator of Digital Commons @ NJIT. For more information, please contact [email protected]. Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specified conditions is that the photocopy or reproduction is not to be “used for any purpose other than private study, scholarship, or research.” If a, user makes a request for, or later uses, a photocopy or reproduction for purposes in excess of “fair use” that user may be liable for copyright infringement, This institution reserves the right to refuse to accept a copying order if, in its judgment, fulfillment
    [Show full text]
  • Kafl: Hardware-Assisted Feedback Fuzzing for OS Kernels
    kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Sergej Schumilo, Cornelius Aschermann, and Robert Gawlik, Ruhr-Universität Bochum; Sebastian Schinzel, Münster University of Applied Sciences; Thorsten Holz, Ruhr-Universität Bochum https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/schumilo This paper is included in the Proceedings of the 26th USENIX Security Symposium August 16–18, 2017 • Vancouver, BC, Canada ISBN 978-1-931971-40-9 Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Sergej Schumilo Cornelius Aschermann Robert Gawlik Ruhr-Universität Bochum Ruhr-Universität Bochum Ruhr-Universität Bochum Sebastian Schinzel Thorsten Holz Münster University of Applied Sciences Ruhr-Universität Bochum Abstract free vulnerabilities, are known threats for programs run- Many kinds of memory safety vulnerabilities have ning in user mode as well as for the operating system been endangering software systems for decades. (OS) core itself. Past experience has shown that attack- Amongst other approaches, fuzzing is a promising ers typically focus on user mode applications. This is technique to unveil various software faults. Recently, likely because vulnerabilities in user mode programs are feedback-guided fuzzing demonstrated its power, pro- notoriously easier and more reliable to exploit. How- ducing a steady stream of security-critical software bugs. ever, with the appearance of different kinds of exploit Most fuzzing efforts—especially feedback fuzzing—are defense mechanisms – especially in user mode, it has limited to user space components of an operating system become much harder nowadays to exploit known vul- (OS), although bugs in kernel components are more nerabilities.
    [Show full text]