Skip to content

Introduction

我们从隔离、访问控制、异常检测、随机化这四种方式来介绍内核中的防御机制。

参考

  • https://linuxplumbersconf.org/event/7/contributions/775/attachments/610/1096/Following_the_Linux_Kernel_Defence_Map.pdf
  • https://github.com/a13xp0p0v/linux-kernel-defence-map
  • https://outflux.net/slides/2018/lca/kspp.pdf
  • https://www.kernel.org/doc/html/latest/security/self-protection.html

  • https://powerofcommunity.net/poc2019/x82.pdf

  • https://samsung.github.io/kspp-study/infoleak.html