Full metadata record
DC FieldValueLanguage
dc.contributor.authorKrahmer, Sebastian-
dc.date.accessioned2006-08-18T06:59:35Z-
dc.date.available2006-08-18T06:59:35Z-
dc.date.issued2004-07-
dc.identifier.urihttp://hdl.handle.net/2003/22817-
dc.identifier.urihttp://dx.doi.org/10.17877/DE290R-7969-
dc.description.abstractTo overcome the common ’find and fix’ technique on todays operating systems, more and more people install special hardening patches or complete RBAC systems. One goal of such systems is to stop intruders from taking control over the whole system and to make exploitation of particular application bugs hard, if not impossible. This paper explores the possibilities intruders have nevertheless.en
dc.format.extent44956 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.relation.ispartofDIMVA 2004, July 6-7, Dortmund, Germanyen
dc.subjectVulnerabilitiesen
dc.subjectVulnerability Assessmenten
dc.subject.ddc004-
dc.titleHardened OS exploitation techniquesen
dc.typeTextde
dc.type.publicationtypeconferenceObjecten
dcterms.accessRightsopen access-
Appears in Collections:White Papers

Files in This Item:
File Description SizeFormat 
DIMVA2004-SP-Krahmer.pdf43.9 kBAdobe PDFView/Open


This item is protected by original copyright



This item is protected by original copyright rightsstatements.org