Exploit Methods

From Linux Kernel Security Subsystem
(Difference between revisions)
Jump to: navigation, search
(Created page with "When bugsin the kernel provide unintended read and write primitives to an attacker, there are many techniques used to gain execution control over the kernel. H...")
 
m
 
Line 1: Line 1:
When [[Bug Classes|bugs]]in the kernel provide unintended read and write primitives to an attacker, there are many techniques used to gain execution control over the kernel. Here we try to explain them, link to examples, and link to defenses that are or could be used to eliminate an exploitation method.
+
When [[Bug Classes|bugs]] in the kernel provide unintended read and write primitives to an attacker, there are many techniques used to gain execution control over the kernel. Here we try to explain them, link to examples, and link to defenses that are or could be used to eliminate an exploitation method.
  
 
[[Kernel Self Protection Project]]
 
[[Kernel Self Protection Project]]

Latest revision as of 20:52, 4 November 2015

When bugs in the kernel provide unintended read and write primitives to an attacker, there are many techniques used to gain execution control over the kernel. Here we try to explain them, link to examples, and link to defenses that are or could be used to eliminate an exploitation method.

Kernel Self Protection Project

Personal tools
Namespaces

Variants
Actions
Navigation
Tools