/
This lecture analyzes various protection techniques in the Linux kernel, methods to bypass them, and various vulnerabilities. Practical examples are provided for each lecture.
573 students
Section 5-1 lecture has been uploaded.
Section 5-1 Stack based BOF lecture has been uploaded.