Login / Signup
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification.
Trent Jaeger
Paul C. van Oorschot
Glenn Wurster
Published in:
Comput. Secur. (2011)
Keyphrases
</>
source code
code generation
support vector
control flow
user interface
machine learning
kernel function
data flow
multimedia
web services
access control
kernel methods