Articles Blog | G5 Cyber Security

Research – StJudeModel.pdf

This paper describes how the StJude kernel module stops local and remote exploits from being successful. The Saint Jude model for improper privilege transitions terminates program execution when it is exploited even if the exploit is unknown.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/23487/StJudeModel.pdf

Source: https://packetstormsecurity.com/files/23487/StJudeModel.pdf.html

Exit mobile version