Driver-Based Attacks: Past and Present
In the attack technique called Bring Your Own Vulnerable Driver (BYOVD), an adversary with administrative privileges installs a legitimately signed driver with a vulnerability on the victim system.
In the attack technique called Bring Your Own Vulnerable Driver (BYOVD), an adversary with administrative privileges installs a legitimately signed driver with a vulnerability on the victim system.