Publisher
Springer Nature Switzerland
Reference20 articles.
1. Chen, H., Mao, Y., Wang, X., Zhou, D., Zeldovich, N., Kaashoek, M.F.: Linux kernel vulnerabilities: state-of-the-art defenses and open problems. In: Proceedings of the Second Asia-Pacific Workshop on Systems. APSys 2011, Association for Computing Machinery, NY, USA (2011). https://doi.org/10.1145/2103799.2103805
2. Criswell, J., Dautenhahn, N., Adve, V.: Kcofi: Complete control-flow integrity for commodity operating system kernels. In: Proceedings of 2014 IEEE Symposium on Security and Privacy, pp. 292–307 (2014). https://doi.org/10.1109/SP.2014.26
3. Exploit Database: Nexus 5 android 5.0 - privilege escalation. https://www.exploit-db.com/exploits/35711/. Accessed 21 May 2019
4. Linux Foundation: The Linux kernel archives. https://www.kernel.org/ Accessed 10 June 2022
5. Linux Foundation: Randomize the address of the kernel image (KASLR). https://www.kernelconfig.io/config_randomize_base. Accessed 10 June 2022
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献