Introduction¶
我們從隔離、訪問控制、異常檢測、隨機化這四種方式來介紹內核中的防禦機制。
參考¶
- https://linuxplumbersconf.org/event/7/contributions/775/attachments/610/1096/Following_the_Linux_Kernel_Defence_Map.pdf
- https://github.com/a13xp0p0v/linux-kernel-defence-map
- https://outflux.net/slides/2018/lca/kspp.pdf
-
https://www.kernel.org/doc/html/latest/security/self-protection.html
- https://samsung.github.io/kspp-study/infoleak.html