A Guide to Kernel Exploitation : Attacking the Core
Enrico. Perla
Bok Engelsk 2010 · Electronic books.
Annen tittel | |
---|---|
Utgitt | Burlington : : Elsevier Science, , 2010.
|
Omfang | 1 online resource (465 p.)
|
Opplysninger | Description based upon print version of record.. - CONTENTS; Foreword; Preface; Acknowledgments; About the Authors; About the Technical Editor; PART I: A JOURNEY TO KERNEL LAND; CHAPTER 1 From User-Land to Kernel-Land Attacks; CHAPTER 2 A Taxonomy of Kernel Vulnerabilities; CHAPTER 3 Stairway to Successful Kernel Exploitation; PART II: THE UNIX FAMILY, MAC OS X, AND WINDOWS; CHAPTER 4 The UNIX Family; CHAPTER 5 Mac OS X; CHAPTER 6 Windows; PART III: REMOTE KERNEL EXPLOITATION; CHAPTER 7 Facing the Challenges of RemoteKernel Exploitation; CHAPTER 8 Putting It All Together: A Linux Case Study; PART IV: FINAL WORDS. - CHAPTER 9 Kernel Evolution: Future Forms of Attackand DefenseIndex. - The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to full
|
Emner | Operating systems (Computers) - Security measures
Computer security. Computer Science Engineering & Applied Sciences operativsystemer datasikkerhet informasjonssikkerhet |
Sjanger | |
Dewey | |
ISBN | 1597494860. - 9781597494861
|