VULNERABLE by Design: why destructive exploits keep on coming


Download What happens when a threat actor leverages the actual functionality of an Operating System (OS) or an application and uses it against itself? This is where design vulnerabilities come in. In this paper, we review how threat actors bypass OS fortifications such as access controls, sandboxes and space randomization simply by abusing intentional OS functionality. Unfortunately, design vulnerabilities not restricted just to Windows but also to Linux and Mac OS X.

0 Comment

Leave a Reply

Captcha image