Results 1 - 10
of
431
Preventing Privilege Escalation
- In Proceedings of the 12th USENIX Security Symposium
, 2003
"... Many operating system services require special privileges to execute their tasks. A programming error in a privileged service may open the door to system compromise in form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this paper, ..."
Abstract
-
Cited by 146 (2 self)
- Add to MetaCart
Many operating system services require special privileges to execute their tasks. A programming error in a privileged service may open the door to system compromise in form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this paper
The Design and Implementation of an Operating System to Support Distributed Multimedia Applications
, 1996
"... Support for multimedia applications by general purpose computing platforms has been the subject of considerable research. Much of this work is based on an evolutionary strategy in which small changes to existing systems are made. The approach adopted here is to start ab initio with no backward compa ..."
Abstract
-
Cited by 291 (22 self)
- Add to MetaCart
implementation on a number of hardware platforms is described. I. Introduction G ENERAL purpose multimedia computing platforms should endow text, images, audio and video with equal status: interpreting an audio or video stream should not be a privileged task of special functions provided by the operating system
Preventing Privilege Escalation
, 2002
"... Many operating system services require special privilege to execute their tasks. A programming error in a privileged service opens the door to system compromise in the form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this paper, ..."
Abstract
- Add to MetaCart
Many operating system services require special privilege to execute their tasks. A programming error in a privileged service opens the door to system compromise in the form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this paper
Privileged Information for Data Clustering
"... Many machine learning algorithms assume that all input samples are independently and identically distributed from some common distribution on either the input space X, in the case of unsupervised learning, or the input and output space X × Y in the case of supervised and semi-supervised learning. In ..."
Abstract
- Add to MetaCart
the inclusion of knowledge from separate hypothetical spaces has been proposed by Vapnik as part of the supervised setting. In this work we are interested in exploring Vapnik’s idea of ‘master-class ’ learning and the associated learning using ‘privileged ’ information, however within the unsupervised setting
Permission re-delegation: Attacks and defenses
- In 20th Usenix Security Symposium
, 2011
"... Modern browsers and smartphone operating systems treat applications as mutually untrusting, potentially malicious principals. Applications are (1) isolated except for explicit IPC or inter-application communication channels and (2) unprivileged by default, requiring user permission for additional pr ..."
Abstract
-
Cited by 127 (7 self)
- Add to MetaCart
privileges. Although inter-application communication supports useful collaboration, it also introduces the risk of permission redelegation. Permission re-delegation occurs when an application with permissions performs a privileged task for an application without permissions. This undermines the requirement
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
- in Proceedings of ACM Mobihoc
, 2005
"... Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying, and revoking compromised sensors, and other network maintenance. Employing mobile sinks however raises a new security challenge: if a mobile sink is ..."
Abstract
-
Cited by 46 (3 self)
- Add to MetaCart
on the principle of least privilege, we first propose an efficient scheme to restrict the privilege of a mobile sink without impeding its ability to carry out any authorized operations for an assigned task. In addition, we present an extension to allow conditional trajectory change due to unexpected events
Towards a Taxonomy of Intrusion-Detection Systems
, 1998
"... Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in general, as it is difficult to provide provably secure information systems and maintain them in such a secure state for their entire lifetime and for every utilization. Somet ..."
Abstract
-
Cited by 173 (4 self)
- Add to MetaCart
. Sometimes, legacy or operational constraints do not even allow a fully secure information system to be realized at all. Therefore, the task of intrusion-detection systems is to monitor the usage of such systems and to detect the apparition of insecure states. They detect attempts and active misuse
Character-based interactive storytelling
- IEEE Intelligent Systems
, 2002
"... is a privileged application of intelligent virtual-actors technology. The authors introduce their character-based interactive storytelling prototype that uses Hierarchical Task Network planning techniques, which support story generation and anytime user intervention. ..."
Abstract
-
Cited by 133 (18 self)
- Add to MetaCart
is a privileged application of intelligent virtual-actors technology. The authors introduce their character-based interactive storytelling prototype that uses Hierarchical Task Network planning techniques, which support story generation and anytime user intervention.
Preventing Privilege Escalation (CITI TR 02-2)
- In Proceedings of the 12th USENIX Security Symposium
, 2003
"... Many operating system services require special privileges to execute their tasks. A programming error in a privileged service may open the door to system compromise in form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this pape ..."
Abstract
- Add to MetaCart
Many operating system services require special privileges to execute their tasks. A programming error in a privileged service may open the door to system compromise in form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges
Interprocedural analysis for privileged code placement and tainted variable detection
- In Proceedings of the 19th European Conference on Object-Oriented Programming
, 2005
"... Abstract. In Java 2 and Microsoft.NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted clients. Since an untrusted client will be on the call stack when access control is enforced, an access-restric ..."
Abstract
-
Cited by 31 (9 self)
- Add to MetaCart
for authorization. For large programs, manually understanding which portions of code should be made privileged is a difficult task. Developers must understand which authorizations will implicitly be extended to client code and make sure that the values of the variables used by the privileged code are not “tainted
Results 1 - 10
of
431