Provided by: SecurityTube.net
Date Added: Sep 2014
The Linux kernel ships with many features which can be and are, exploited by attackers. In this webcast, the presenters explore two different approaches to reduce the kernel attack surface. One at compile-time whereby execution traces of the kernel are taken into account to automatically generate a tailored kernel configuration, another at run-time whereby traces are directly used at run-time to detect the use of unnecessary functions by a subset of applications.