Process Hijacking

11/4/1998


Click here to start


Table of Contents

Process Hijacking

What is Hijacking?

What is Hijacking?

What is Hijacking?

What is Our Bidding?

What is Condor?

Condor

Process Hijacking

Hijack with DynInst

The Rest of My Talk

The Condor Shadow

Overriding System Calls

Overriding System Calls

Overriding System Calls

Hijacker's Dilemma

Hijacker's Dilemma

Process Hijacking

Process Hijacking

Process Hijacking

Process Hijacking

Process Hijacking

Process Hijacking

Process Hijacking

Process Hijacking

Change calls with DynInst

Patching in New Code

Patching in New Code

Replacing System Calls

Replacing System Calls

Replacing System Calls

Replacing System Calls

Replacing System Calls

Replacing System Calls

Checkpointing

Checkpointing

Checkpointing

Checkpointing

Restarting (Condor)

Restarting (Condor)

Restarting (Hijacking)

Restarting (Hijacking)

Restarting (Hijacking)

Restarting (Hijacking)

Restarting (Hijacking)

Restarting (Hijacking)

Status

Limitations

Limitations

Summary

Author: Victor Zandy

Email: condor-admin@cs.wisc.edu

Home Page: http://www.cs.wisc.edu/condor

Other information:
"Process Hijacking", presented at the University of Wisconsin-Madison Department of Computer Sciences, November 2nd, 1998.

Download presentation source