Restricted Syscalls and Capability Models: Minimizing Exploit Surfaces by Design

Sign in to access this lesson.