![]() ![]() ![]() Arbitrary reads are an example of breaking confidentiality, control flow redirection through a slab overflow is an example of breaking integrity, and a proof-of-concept code triggering a stack overflow and crashing the machine is an example of breaking availability. This chapter models kernel level attacks under the looking glass of the three principles of information security: confidentiality, integrity, and availability. It attempts to close the gap and analyze what countermeasures can be implemented to prevent or limit kernel-level attacks. ![]() This chapter discusses final aspects of kernel exploitation. Enrico Perla, Massimiliano Oldani, in A Guide to Kernel Exploitation, 2011 Publisher Summary ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |