Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If someone has root, it's already game over. An attacker could just hook the syscalls directly which would be more stealthy that using BPF programs.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: