• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 431
Next 10 →

Preventing Privilege Escalation

by Niels Provos - In Proceedings of the 12th USENIX Security Symposium , 2003
"... Many operating system services require special privileges to execute their tasks. A programming error in a privileged service may open the door to system compromise in form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this paper, ..."
Abstract - Cited by 146 (2 self) - Add to MetaCart
Many operating system services require special privileges to execute their tasks. A programming error in a privileged service may open the door to system compromise in form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this paper

The Design and Implementation of an Operating System to Support Distributed Multimedia Applications

by Ian Leslie, Derek Mcauley, Richard Black, Timothy Roscoe, Paul Barham, David Evers, Robin Fairbairns, Eoin Hyden , 1996
"... Support for multimedia applications by general purpose computing platforms has been the subject of considerable research. Much of this work is based on an evolutionary strategy in which small changes to existing systems are made. The approach adopted here is to start ab initio with no backward compa ..."
Abstract - Cited by 291 (22 self) - Add to MetaCart
implementation on a number of hardware platforms is described. I. Introduction G ENERAL purpose multimedia computing platforms should endow text, images, audio and video with equal status: interpreting an audio or video stream should not be a privileged task of special functions provided by the operating system

Preventing Privilege Escalation

by Niels Provos Markus , 2002
"... Many operating system services require special privilege to execute their tasks. A programming error in a privileged service opens the door to system compromise in the form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this paper, ..."
Abstract - Add to MetaCart
Many operating system services require special privilege to execute their tasks. A programming error in a privileged service opens the door to system compromise in the form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this paper

Privileged Information for Data Clustering

by Jan Feyereisl A, Uwe Aickelin A
"... Many machine learning algorithms assume that all input samples are independently and identically distributed from some common distribution on either the input space X, in the case of unsupervised learning, or the input and output space X × Y in the case of supervised and semi-supervised learning. In ..."
Abstract - Add to MetaCart
the inclusion of knowledge from separate hypothetical spaces has been proposed by Vapnik as part of the supervised setting. In this work we are interested in exploring Vapnik’s idea of ‘master-class ’ learning and the associated learning using ‘privileged ’ information, however within the unsupervised setting

Permission re-delegation: Attacks and defenses

by Adrienne Porter Felt, Steven Hanna, Erika Chin, Helen J. Wang, Er Moshchuk - In 20th Usenix Security Symposium , 2011
"... Modern browsers and smartphone operating systems treat applications as mutually untrusting, potentially malicious principals. Applications are (1) isolated except for explicit IPC or inter-application communication channels and (2) unprivileged by default, requiring user permission for additional pr ..."
Abstract - Cited by 127 (7 self) - Add to MetaCart
privileges. Although inter-application communication supports useful collaboration, it also introduces the risk of permission redelegation. Permission re-delegation occurs when an application with permissions performs a privileged task for an application without permissions. This undermines the requirement

Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks

by Hui Song, Sencun Zhu, Wensheng Zhang, Guohong Cao - in Proceedings of ACM Mobihoc , 2005
"... Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying, and revoking compromised sensors, and other network maintenance. Employing mobile sinks however raises a new security challenge: if a mobile sink is ..."
Abstract - Cited by 46 (3 self) - Add to MetaCart
on the principle of least privilege, we first propose an efficient scheme to restrict the privilege of a mobile sink without impeding its ability to carry out any authorized operations for an assigned task. In addition, we present an extension to allow conditional trajectory change due to unexpected events

Towards a Taxonomy of Intrusion-Detection Systems

by Herve Debar, Marc Dacier, Andreas Wespi , 1998
"... Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in general, as it is difficult to provide provably secure information systems and maintain them in such a secure state for their entire lifetime and for every utilization. Somet ..."
Abstract - Cited by 173 (4 self) - Add to MetaCart
. Sometimes, legacy or operational constraints do not even allow a fully secure information system to be realized at all. Therefore, the task of intrusion-detection systems is to monitor the usage of such systems and to detect the apparition of insecure states. They detect attempts and active misuse

Character-based interactive storytelling

by Marc Cavazza, Fred Charles, Steven J. Mead - IEEE Intelligent Systems , 2002
"... is a privileged application of intelligent virtual-actors technology. The authors introduce their character-based interactive storytelling prototype that uses Hierarchical Task Network planning techniques, which support story generation and anytime user intervention. ..."
Abstract - Cited by 133 (18 self) - Add to MetaCart
is a privileged application of intelligent virtual-actors technology. The authors introduce their character-based interactive storytelling prototype that uses Hierarchical Task Network planning techniques, which support story generation and anytime user intervention.

Preventing Privilege Escalation (CITI TR 02-2)

by Niels Provos, Niels Provos - In Proceedings of the 12th USENIX Security Symposium , 2003
"... Many operating system services require special privileges to execute their tasks. A programming error in a privileged service may open the door to system compromise in form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this pape ..."
Abstract - Add to MetaCart
Many operating system services require special privileges to execute their tasks. A programming error in a privileged service may open the door to system compromise in form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges

Interprocedural analysis for privileged code placement and tainted variable detection

by Marco Pistoia, Robertj. Flynn, Larry Koved, Vugranam C. Sreedhar - In Proceedings of the 19th European Conference on Object-Oriented Programming , 2005
"... Abstract. In Java 2 and Microsoft.NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted clients. Since an untrusted client will be on the call stack when access control is enforced, an access-restric ..."
Abstract - Cited by 31 (9 self) - Add to MetaCart
for authorization. For large programs, manually understanding which portions of code should be made privileged is a difficult task. Developers must understand which authorizations will implicitly be extended to client code and make sure that the values of the variables used by the privileged code are not “tainted
Next 10 →
Results 1 - 10 of 431
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University