作者: Robert NM Watson , None
DOI:
关键词:
摘要: System call interposition allows the kernel security model to be extended. However, when combined with current operating systems, it is open concurrency vulnerabilities leading privilege escalation and audit bypass. We discuss theory practice of system wrapper vulnerabilities, demonstrate exploit techniques against GSWTK, Systrace, CerbNG.