Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Krahmer, Sebastian | - |
dc.date.accessioned | 2006-08-18T06:59:35Z | - |
dc.date.available | 2006-08-18T06:59:35Z | - |
dc.date.issued | 2004-07 | - |
dc.identifier.uri | http://hdl.handle.net/2003/22817 | - |
dc.identifier.uri | http://dx.doi.org/10.17877/DE290R-7969 | - |
dc.description.abstract | To overcome the common ’find and fix’ technique on todays operating systems, more and more people install special hardening patches or complete RBAC systems. One goal of such systems is to stop intruders from taking control over the whole system and to make exploitation of particular application bugs hard, if not impossible. This paper explores the possibilities intruders have nevertheless. | en |
dc.format.extent | 44956 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en | - |
dc.relation.ispartof | DIMVA 2004, July 6-7, Dortmund, Germany | en |
dc.subject | Vulnerabilities | en |
dc.subject | Vulnerability Assessment | en |
dc.subject.ddc | 004 | - |
dc.title | Hardened OS exploitation techniques | en |
dc.type | Text | de |
dc.type.publicationtype | conferenceObject | en |
dcterms.accessRights | open access | - |
Appears in Collections: | White Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
DIMVA2004-SP-Krahmer.pdf | 43.9 kB | Adobe PDF | View/Open |
This item is protected by original copyright |
This item is protected by original copyright rightsstatements.org