Hardened OS exploitation techniques
dc.contributor.author | Krahmer, Sebastian | |
dc.date.accessioned | 2006-08-18T06:59:35Z | |
dc.date.available | 2006-08-18T06:59:35Z | |
dc.date.issued | 2004-07 | |
dc.description.abstract | To overcome the common ’find and fix’ technique on todays operating systems, more and more people install special hardening patches or complete RBAC systems. One goal of such systems is to stop intruders from taking control over the whole system and to make exploitation of particular application bugs hard, if not impossible. This paper explores the possibilities intruders have nevertheless. | en |
dc.format.extent | 44956 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/2003/22817 | |
dc.identifier.uri | http://dx.doi.org/10.17877/DE290R-7969 | |
dc.language.iso | en | |
dc.relation.ispartof | DIMVA 2004, July 6-7, Dortmund, Germany | en |
dc.subject | Vulnerabilities | en |
dc.subject | Vulnerability Assessment | en |
dc.subject.ddc | 004 | |
dc.title | Hardened OS exploitation techniques | en |
dc.type | Text | de |
dc.type.publicationtype | conferenceObject | en |
dcterms.accessRights | open access |