<--- Back to Details
First PageDocument Content
Central processing unit / Linux kernel / Linux / Monolithic kernels / PaX / NX bit / Kernel / Buffer overflow / X86-64 / Computer architecture / Software / System software
Date: 2012-10-10 09:43:40
Central processing unit
Linux kernel
Linux
Monolithic kernels
PaX
NX bit
Kernel
Buffer overflow
X86-64
Computer architecture
Software
System software

Introduction Kernel Toolchain

Add to Reading List

Source URL: pax.grsecurity.net

Download Document from Source Website

File Size: 820,61 KB

Share Document on Facebook

Similar Documents

Software / Computer architecture / Computing / Computing platforms / Monolithic kernels / Linux kernel / Kernel / Google Native Client / Self-modifying code / Android / Loadable kernel module / Sandbox

ARMlock: Hardware-based Fault Isolation for ARM Yajin Zhou, Xiaoguang Wang, Yue Chen, and Zhi Wang North Carolina State University Xi’an Jiaotong University Florida State University

DocID: 1roQV - View Document

Computing / Software / Computer architecture / Computing platforms / Freedesktop.org / Monolithic kernels / D-Bus / Inter-process communication / Remote procedure call / Linux / Device driver / Android

Meetup Toulouse, MayUnderstanding D-Bus Myl`ene Josserand Free Electrons

DocID: 1regJ - View Document

Computer architecture / Computing / Software / Operating system kernels / Application programming interfaces / Monolithic kernels / Rump kernel / NetBSD / Kernel / Unikernel / Linux kernel / System call

lowRISC Summer of Code TCP/IP Offload to Minion Cores using Rump Kernels Sebastian Wicki Mentored by: Justin Cormack, Antti Kantee Organizer: Alex Bradbury, lowRISC

DocID: 1qZ7J - View Document

Software / System software / Computer architecture / Monolithic kernels / Kernel / Linux kernel / Sandbox

Tradition Sandstorm 95% of CVEs?

DocID: 1qXR3 - View Document

Software / Computing / Computer architecture / Computing platforms / Monolithic kernels / Kernel / Linux kernel / Address space layout randomization / Linux / Android / User space

Anatomy of a Remote Kernel Exploit Dan Rosenberg Copyright © 2011 Virtual Security Research, LLC.

DocID: 1qVjv - View Document