Process Hijacking
What is Hijacking?
What is Our Bidding?
What is Condor?
Condor
Hijack with DynInst
The Rest of My Talk
The Condor Shadow
Overriding System Calls
Hijacker's Dilemma
Change calls with DynInst
Patching in New Code
Replacing System Calls
Checkpointing
Restarting (Condor)
Restarting (Hijacking)
Status
Limitations
Summary
Email: condor-admin@cs.wisc.edu
Home Page: http://www.cs.wisc.edu/condor
Other information: "Process Hijacking", presented at the University of Wisconsin-Madison Department of Computer Sciences, November 2nd, 1998.
Download presentation source