8.3 Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms

Last updated