Skip to Content
Windows Security Internals
book

Windows Security Internals

by James Forshaw
April 2024
Intermediate to advanced
608 pages
17h 13m
English
No Starch Press
Content preview from Windows Security Internals

8 OTHER ACCESS CHECKING USE CASES

Access checks determine what access a caller should have when opening a kernel resource. However, we sometimes perform them for other reasons, as they can serve as additional security checks. This chapter details some examples of using access checks as a secondary security mechanism.

We’ll start by looking at traversal checking, which determines whether a caller has access to a hierarchy of resources. Next, we’ll discuss how access checks are used when a handle is duplicated. We’ll also consider how an access check can limit access to kernel information, such as process listings, from sandboxed applications. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Linux Security and Hardening - Third Edition

Mastering Linux Security and Hardening - Third Edition

Donald A. Tevault

Publisher Resources

ISBN: 9781098168834Errata Page