Subverting Operating System Properties Through Evolutionary DKOM Attacks.
Mariano GrazianoLorenzo FloreAndrea LanziDavide BalzarottiPublished in: DIMVA (2016)
Keyphrases
- operating system
- computer systems
- security mechanisms
- virtual machine
- windows xp
- address space
- distributed systems
- microsoft windows
- computer security
- multi threaded
- linux kernel
- databases
- command line
- discretionary access control
- interprocess communication
- protection scheme
- virtual memory
- application level
- open source