Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems
The article discusses the rise of non-control data attacks, especially in the domain of OS kernel exploits, where corrupting critical non-control data can lead to root access or privilege escalation….
Continue reading