In-Kernel Cryptographic Executable Verification. - IFIP Digital Library

0 downloads 0 Views 3MB Size Report
thorized code, and reviews existing solutions for dealing with them. A technique involving ... An example is the Bofra vul- nerability 14), which ... An exam- ple is the privilege escalation attack that takes advantage of the sudo utility's failure to ...

Suggest Documents