From Ring Zero To Uid Zero

No ratings

Presented at Chaos Communication Congress 24 by

The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted.