October 2010
Beginner to intermediate
464 pages
13h 19m
English
Future Forms of Attack and Defense
Information in this Chapter
Kernel Attacks
Kernel Defense
Beyond Kernel Bugs: Virtualization
Introduction
Throughout this book, we have discussed a variety of kernel bugs along with the exploit techniques that are used to (ab)use them. As with most areas of computer security, kernel exploitation is not a static field. Exploit techniques and defense mechanisms continue to evolve, often as a result of the usual cat and mouse game played by attackers and defenders. In this chapter we will discuss what the future holds for each side of the playing field.
To bring some order to the many aspects of attack and defense techniques, we will focus on a basic factor of computer ...
Read now
Unlock full access