Modeling, Detecting And Responding To Unauthorized Root Transitions presented at DEF CON 08

by Tim Lawless, Saint Jude,

Tags: Security