Outline Background Architecture Implementation Attack and Defense Secure the linux kernel Summary