Chapter 9 Kernel Evolution
Future Forms of Attack and Defense
Information in this Chapter
Beyond Kernel Bugs: Virtualization
Throughout this book, we have discussed a variety of kernel bugs along with the exploit techniques that are used to (ab)use them. As with most areas of computer security, kernel exploitation is not a static field. Exploit techniques and defense mechanisms continue to evolve, often as a result of the usual cat and mouse game played by attackers and defenders. In this chapter we will discuss what the future holds for each side of the playing field.
To bring some order to the many aspects of attack and defense techniques, we will focus on a basic factor of computer ...