Chapter 9 Kernel Evolution

Future Forms of Attack and Defense

Information in this Chapter

  • Kernel Attacks

  • Kernel Defense

  • Beyond Kernel Bugs: Virtualization

Introduction

Throughout this book, we have discussed a variety of kernel bugs along with the exploit techniques that are used to (ab)use them. As with most areas of computer security, kernel exploitation is not a static field. Exploit techniques and defense mechanisms continue to evolve, often as a result of the usual cat and mouse game played by attackers and defenders. In this chapter we will discuss what the future holds for each side of the playing field.

To bring some order to the many aspects of attack and defense techniques, we will focus on a basic factor of computer ...

Get A Guide to Kernel Exploitation now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.