Login / Signup

Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification.

Trent JaegerPaul C. van OorschotGlenn Wurster
Published in: Comput. Secur. (2011)
Keyphrases
  • source code
  • code generation
  • support vector
  • control flow
  • user interface
  • machine learning
  • kernel function
  • data flow
  • multimedia
  • web services
  • access control
  • kernel methods