• Privtrans

  • Referenced in 4 articles [sw23074]
  • Privtrans: automatically partitioning programs for privilege separation. Privilege separation partitions a single program into ... parts: a privileged program called the monitor and an unprivileged program called the slave ... trust and privileges are relegated to the monitor, which results in a smaller and more ... easily secured trust base. Previously the privilege separation procedure, i.e., partitioning one program into...
  • MulVAL

  • Referenced in 8 articles [sw17743]
  • description, reasoning rules, operating-system permission and privilege model, etc.). We easily leverage existing vulnerability...
  • Privman

  • Referenced in 3 articles [sw35845]
  • secure code development: partitioning processes to isolate privileges in trusted code. Privilege separation ... present Privman, a library that makes privilege separation easy. The primary benefit of the Privman...
  • SAFKASI

  • Referenced in 5 articles [sw20431]
  • their caller is authorized to exercise the privilege of using the dangerous routine. Java systems...
  • FlowDroid

  • Referenced in 5 articles [sw26741]
  • malicious apps that exploit their given privileges to copy such data intentionally. While existing static...
  • Mir

  • Referenced in 1 article [sw35823]
  • Automated Quantifiable Privilege Reduction Against Dynamic Library Compromise in JavaScript. Third-party libraries ease ... However, they often execute with significantly more privilege than needed to complete their task. This ... additional privilege is often exploited at runtime via dynamic compromise, even when these libraries ... enables a novel quantification of privilege reduction...
  • EnclaveDom

  • Referenced in 1 article [sw35847]
  • EnclaveDom: Privilege Separation for Large-TCB Applications in Trusted Execution Environments. Trusted executions environments (TEEs ... these data structures may be protected via privilege isolation. We present EnclaveDom, a privilege separation...
  • Lintent

  • Referenced in 2 articles [sw21576]
  • type-and-effect system to statically prevent privilege escalation attacks on well-typed components. Drawing...
  • JSand

  • Referenced in 2 articles [sw35825]
  • included scripts operate with the privileges of the including website. We propose JSand, a server...
  • Rowhammer.js

  • Referenced in 2 articles [sw42336]
  • security of all affected systems, e.g., privilege escalation attacks. All studies and attacks related...
  • CoChecker

  • Referenced in 1 article [sw13316]
  • application as a deputy (referred to as privilege escalation attack). Thus it is desirable ... chains of components) that would lead to privilege escalation attacks using static taint analysis...
  • stress-ng

  • Referenced in 1 article [sw37372]
  • this manner. Running stress-ng with root privileges will adjust out of memory settings ... this judiciously. With the apropriate privilege, stress-ng can allow the ionice class and ionice...
  • Boxify

  • Referenced in 1 article [sw38763]
  • based on application virtualization and process-based privilege separation to securely encapsulate untrusted apps ... deployed without firmware modifications or root privileges. A systematic evaluation of Boxify demonstrates its capability...
  • BioBrowser

  • Referenced in 1 article [sw00079]
  • material based on the user privileges. The database is supplied by a SOAP web service...
  • MILENIO

  • Referenced in 1 article [sw02265]
  • offers the following features: specific assignment of privileges; agents’ authorities authentication using digital signatures; allowances...
  • McScM

  • Referenced in 1 article [sw14482]
  • basic infrastructure for implementing verification algorithms, and privileges to conveniently implement new ideas...
  • Panoply

  • Referenced in 1 article [sw25456]
  • software on the system, even from the privileged OS or hypervisor. While being a promising...
  • Bioconda

  • Referenced in 1 article [sw28864]
  • easily installed and managed without administrative privileges...
  • Aronnax

  • Referenced in 1 article [sw28947]
  • compute node, including without administrative privileges. Easy to configure. All parameters, including grid size...
  • MPWide

  • Referenced in 1 article [sw30504]
  • wide area networks for those without administrative privileges. It can be used to provide message...