Privilege escalation

Results: 82



#Item
11Technology / IOS jailbreaking / Android / Mobile device management / IPhone / IOS / Privilege escalation / Mobile operating system / Malware / Computing / Smartphones / Software

Practical Attacks against Mobile Device Management (MDM) Solutions Michael Shaulov, CEO and co-founder, Lacoon Mobile Security Daniel Brodie, Sr. Security Researcher, Lacoon Mobile Security danielb@lac

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 03:53:44
12Privilege escalation / Lenovo / Vulnerability / Code signing / Malware / Privilege / Access token / Ring / Computer security / Computing / Cyberwarfare

IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

Add to Reading List

Source URL: ioactive.com

Language: English
13Computer security / Android / Malware / Embedded Linux / Rootkit / Rooting / Ptrace / Privilege escalation / Linux Security Modules / Computing / Smartphones / Software

Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:41
14Android devices / Free software / Android / Embedded Linux / Hardware restrictions / Rooting / Privilege escalation / Rootkit / Motorola Droid / Smartphones / Software / Computing

Fourteenforty Research Institute, Inc. Black Hat Abu Dhabi 2011 Yet Another Android Rootkit

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:41
15Computer architecture / Android Market / Android / Symbian / Nexus One / IOS / Privilege escalation / Windows Mobile / Principle of least privilege / Smartphones / Computing / Software

Defending Users Against Smartphone Apps: Techniques and Future Directions William Enck North Carolina State University

Add to Reading List

Source URL: www.enck.org

Language: English
16Human–computer interaction / Firefox / Google Chrome / Web browser / JavaScript / Privilege escalation / Principle of least privilege / World Wide Web / Cascading Style Sheets / Software / Computing / Software testing

A Quantitative Evaluation of Privilege Separation in Web Browser Designs Xinshu Dong, Hong Hu, Prateek Saxena, and Zhenkai Liang Department of Computer Science, National University of Singapore {xdong, huhong, prateeks,

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
17Computer network security / Malware / Computing / Android / Privilege escalation / Computer security / Software / Smartphones / Cloud clients / Security

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-09-12 19:34:16
18Chroot / Kernel / Capability-based security / Operating system / Unix / Privilege escalation / Microkernel / User identifier / Principle of least privilege / System software / Computer security / Software

Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-05-06 16:45:01
19Computer security / Elias Levy / Buffer overflow / Privilege escalation / Bugtraq / Phrack / Heap overflow / Stack buffer overflow / Vulnerability / Software bugs / Software quality / Computing

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:11
UPDATE