Top White Papers
Korset: Linux Security Thanks to Static AnalysisSep 12, 2008, 13:53 (0 Talkback[s])
(Other stories by Mathias Huber)
[ Thanks to Britta for this link. ]
"Since most attacks are accompanied by system calls, the CFGs limit themselves to these calls and document the legitimate pattern for each application. If a program deviates from the pattern, the kernel ends the process."
0 Talkback[s] (click to add your comment)