Hardened OS exploitation techniques

dc.contributor.authorKrahmer, Sebastian
dc.date.accessioned2006-08-18T06:59:35Z
dc.date.available2006-08-18T06:59:35Z
dc.date.issued2004-07
dc.description.abstractTo overcome the common ’find and fix’ technique on todays operating systems, more and more people install special hardening patches or complete RBAC systems. One goal of such systems is to stop intruders from taking control over the whole system and to make exploitation of particular application bugs hard, if not impossible. This paper explores the possibilities intruders have nevertheless.en
dc.format.extent44956 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/2003/22817
dc.identifier.urihttp://dx.doi.org/10.17877/DE290R-7969
dc.language.isoen
dc.relation.ispartofDIMVA 2004, July 6-7, Dortmund, Germanyen
dc.subjectVulnerabilitiesen
dc.subjectVulnerability Assessmenten
dc.subject.ddc004
dc.titleHardened OS exploitation techniquesen
dc.typeTextde
dc.type.publicationtypeconferenceObjecten
dcterms.accessRightsopen access

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
DIMVA2004-SP-Krahmer.pdf
Size:
43.9 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.91 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections