Our goal is not to provide a "how to" guide for potential penetrators
of operating systems. Rather we study these flaws to understand
the careful analysis necessary in designing and testing
operating systems (Pfleeger and Pfleeger in "Security in
Computing")