Displaying 1 result from an estimated 1 matches for "technques".
Did you mean:
techniques
2007 Aug 09
9
Is DTrace Vulnerable?
...kernel security model to be
extended. However, when combined with current operating systems, it is
open to concurrency vulnerabilities leading to privilege escalation and
audit bypass. We discuss the theory and practice of system call wrapper
concurrency vulnerabilities, and demonstrate exploit technques against
GSWTK, Systrace, and CerbNG.