Back to Results
First PageMeta Content
X86 architecture / X86-64 / Kernel / Ioctl / Linux kernel / Thread / Architecture of Windows NT / Memory protection / Computer architecture / Software / Computing


KERNEL WARS: KERNEL-EXPLOITATION DEMYSTIFIED Introduction to kernel-mode vulnerabilities and exploitation
Add to Reading List

Document Date: 2014-12-16 19:06:37


Open Document

File Size: 414,93 KB

Share Result on Facebook
UPDATE