Chapter 10 Other Uses of Runtime Modification

Most of this book focused on runtime modification as a way to negatively affect system security. But runtime modification can also be used in positive ways. In fact, the same runtime modification techniques used by a managed code rootkit can also be used to modify a system's internals so that it is specifically tailored to the user's applications, while at the same time hardening the security of the applications running on the system. Additionally, these techniques can be used to optimize the runtime to provide a safer security playground for executed code by doing such things as restricting ...

Get Managed Code Rootkits now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.