We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 7,589 results
  1. Test-suite-guided discovery of least privilege for cloud infrastructure as code

    Infrastructure as code (IaC) for the cloud, which automatically configures a system’s cloud environment from source code, is an important practice...

    Ryo Shimizu, Yuna Nunomura, Hideyuki Kanuka in Automated Software Engineering
    Article 05 March 2024
  2. Are chrome extensions compliant with the spirit of least privilege?

    Extensions are small applications installed by users and enrich the user experience of browsing the Internet. Browsers expose a set of restricted...

    Pablo Picazo-Sanchez, Lara Ortiz-Martin, ... Andrei Sabelfeld in International Journal of Information Security
    Article Open access 04 September 2022
  3. Least Privilege Learning for Attribute Obfuscation

    As machine learning systems become ever more prevalent in everyday life, the need to secure such systems is becoming a critically important area in...
    Glen Brown, Jesus Martinez-del-Rincon, Paul Miller in Pattern Recognition
    Conference paper 2022
  4. Least Privilege

    Sabrina De Capitani di Vimercati in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2021
  5. Enabling Lightweight Privilege Separation in Applications with MicroGuards

    Application compartmentalization and privilege separation are our primary weapons against ever-increasing security threats and privacy concerns on...
    Zahra Tarkhani, Anil Madhavapeddy in Applied Cryptography and Network Security Workshops
    Conference paper 2023
  6. Perception and privilege

    Inequality perceptions differ along racial and gendered lines. To explain these disparities, we propose an agent-based model of localised perceptions...

    Daniel M. Mayerhoffer, Jan Schulz in Applied Network Science
    Article Open access 20 May 2022
  7. Privilege Elevation

    By default, applications on macOS run with the privileges of the currently logged in user. Different users might have different rights with respect...
    Chapter 2021
  8. Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes

    Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing in recent years. In particular, if administrator...

    Toshihiro Yamauchi, Yohei Akao, ... Masaki Hashimoto in International Journal of Information Security
    Article Open access 25 June 2020
  9. Software Security—Exploits and Privilege Escalation

    Here we consider common methods that exploit vulnerabilities in (typically non-security) software programs, through abuse of features in programming...
    Paul C. van Oorschot in Computer Security and the Internet
    Chapter 2021
  10. Identifying the most accurate machine learning classification technique to detect network threats

    Insider threats have recently become one of the most urgent cybersecurity challenges facing numerous businesses, such as public infrastructure...

    Mohamed Farouk, Rasha Hassan Sakr, Noha Hikal in Neural Computing and Applications
    Article Open access 05 March 2024
  11. Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks

    As the rising popularity of Bitcoin, people tend to use Bitcoin wallets to manage the keys for spending or receiving funds. Instead of generating...

    Chun-I Fan, Yi-Fan Tseng, ... Hiroaki Kikuchi in International Journal of Information Security
    Article 08 November 2019
  12. Methodological Proposal for Privilege Escalation in Windows Systems

    One of the operating systems most used today is Windows, created by the Microsoft company since its launch on November 20, 1985. As a result of the...
    Diego Muñoz Espinosa, David Cordero Vidal, Cristian Barría Huidobro in Telematics and Computing
    Conference paper 2021
  13. Privilege Escalation

    Once we have established an authenticated session of any type, whether the session is legitimate or hacked via any of the attacks previously...
    Morey J. Haber in Privileged Attack Vectors
    Chapter 2020
  14. A novel two phase data sensitivity based access control framework for healthcare data

    This paper proposes a secure data access control framework that utilizes the attribute values and the user specific usage details to provide secure...

    Sayantani Saha, Chandreyee Chowdhury, Sarmistha Neogy in Multimedia Tools and Applications
    Article 13 June 2023
  15. Kubernetes RBAC

    In this chapter, we will learn about the Role-Based Access Control capabilities that Kubernetes offers so that we can grant access to various types...
    Chapter 2023
  16. Access Control and Privilege Management

    In this chapter you will learn about fundamental concepts along with best practices of authorization and access control. You will also gain an...
    Chapter 2020
  17. Optimus: association-based dynamic system call filtering for container attack surface reduction

    While container adoption has witnessed significant growth in facilitating the operation of large-scale applications, this increased attention has...

    Seungyong Yang, Brent Byunghoon Kang, Jaehyun Nam in Journal of Cloud Computing
    Article Open access 23 March 2024
  18. Enhancement and formal verification of the ICC mechanism with a sandbox approach in android system

    Inter-Component Communication (ICC) plays a crucial role in facilitating information exchange and functionality integration within the complex...

    Jiaqi Yin, Sini Chen, ... Huibiao Zhu in Software Quality Journal
    Article 27 June 2024
  19. Software Security—Exploits and Privilege Escalation

    Here we discuss known methods to exploit common security vulnerabilities in programs. The focus of software security (versus, e.g., security...
    Paul C. van Oorschot in Computer Security and the Internet
    Chapter 2020
  20. Managing Accounts and Security

    As data becomes more and more important for the organization and with the sharp rise in cybercrime, data security is a major concern for every...
    Chapter 2023
Did you find what you were looking for? Share feedback.