Reading Questions

Remember to submit your answer to this question BEFORE the next class.

Please read the question on page 154 of the Computer Security book: Can we use two processes to implement Dirty Cow attacks, instead of two threads£¿ Why or why not?