Method and system for detecting kernel corruption exploits
Abstract:
Methods and systems provide for detecting exploitation of kernel vulnerabilities which typically corrupt memory. The methods and systems are implemented, for example, via a host, which includes a hypervisor, which controls the operating system (OS) user space and the OS kernel space.
Public/Granted literature
Information query
Patent Agency Ranking
0/0