The Linux Kernel's Attack Surface (and How We Can Reduce It)

The Linux kernel ships with many features which can be and are, exploited by attackers. In this webcast, the presenters explore two different approaches to reduce the kernel attack surface. One at compile-time whereby execution traces of the kernel are taken into account to automatically generate a tailored kernel configuration, another at run-time whereby traces are directly used at run-time to detect the use of unnecessary functions by a subset of applications.

Provided by: SecurityTube.net Topic: Date Added: Sep 2014 Format: Webcast

Find By Topic