Ensuring Operating System Kernel Integrity with Osck

Attacker has access to kernel memory; Modify kernel state to hide resources; Kernel ... Linux: tree for scheduling, list for enumerating processes; Invariant: ...
展开查看详情