Privilege separation

Results: 79



#Item
1

Diesel: Applying Privilege Separation to Database Access Adrienne Porter Felt, Matthew Finifter, Joel Weinberger, and David Wagner {apf, finifter, jww, daw}@cs.berkeley.edu UC Berkeley

Add to Reading List

Source URL: mfinifter.github.io

Language: English - Date: 2016-04-20 20:43:40
    2

    Privtrans: Automatically Partitioning Programs for Privilege Separation David Brumley and Dawn Song Carnegie Mellon University {david.brumley,dawn.song}@cs.cmu.edu ∗ Abstract Privilege separation partitions a single pr

    Add to Reading List

    Source URL: users.ece.cmu.edu

    - Date: 2014-05-29 15:38:01
      3Software / System software / Computing / Message transfer agents / Internet Standards / IBM software / Postfix / Ntpd / Privilege separation / Sandbox / POSIX / Address space layout randomization

      Privilege Separation and Pledge Main maid DNS maid - Theo de Raadt

      Add to Reading List

      Source URL: www.openbsd.org

      Language: English - Date: 2016-04-23 06:34:05
      4Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

      Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

      Add to Reading List

      Source URL: www.unixwiz.net

      Language: English - Date: 2014-08-03 23:18:45
      5

      AutoPS: A Suite of Tools for Privilege Separation in Software Systems Amruth Venkatraman, Jonathan Chien, Thomas Lu, Jeffrey Sun December 12,

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:50:02
        6Software / System software / Computing / Message transfer agents / Internet Standards / IBM software / Postfix / Ntpd / Privilege separation / Sandbox / POSIX / Privilege

        Privilege Separation and Pledge Main maid DNS maid - Theo de Raadt

        Add to Reading List

        Source URL: www.openbsd.org

        Language: English - Date: 2016-04-23 06:34:05
        7Software / Computing / VM / Hardware virtualization / HTTP cookie / Operating system / Google Chrome / Java / Qubes OS

        Virtics: A System for Privilege Separation of Legacy Desktop Applications Matt Piotrowski Anthony D. Joseph

        Add to Reading List

        Source URL: www.eecs.berkeley.edu

        Language: English - Date: 2010-05-13 19:17:03
        8System software / Software / Computer architecture / System administration / Unix / Access control / Setuid / Privilege separation / Fstab / File system permissions / Principle of least privilege / Mandatory access control

        Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu Abstract

        Add to Reading List

        Source URL: www3.cs.stonybrook.edu

        Language: English - Date: 2014-03-25 14:11:54
        9

        Privilege Separation in HTML5 Applications Devdatta Akhawe, Prateek Saxena, Dawn Song University of California, Berkeley {devdatta,prateeks,dawnsong}@cs.berkeley.edu Abstract

        Add to Reading List

        Source URL: www.usenix.org

        Language: English
          10Smartphones / Alphabet Inc. / Android / Advertising / IOS / Online advertising / Google Play / Targeted advertising / Rooting / Software widget / Mobile malware / IPhone

          AdDroid: Privilege Separation for Applications and Advertisers in Android Paul Pearce, Adrienne Porter Felt Computer Science Division University of California Berkeley

          Add to Reading List

          Source URL: www.cs.berkeley.edu

          Language: English - Date: 2014-02-17 17:32:41
          UPDATE