This project is intended to demonstrate that current popular approaches to software security (e.g. DAC, VMA randomization, etc) are not sufficient and that other approaches should be considered more seriously (e.g. MAC, design by contract).
Follow Project Bukowski
Rate This ProjectLogin To Rate This Project
Be the first to post a review of Project Bukowski!