Search
Search Results
-
Test-suite-guided discovery of least privilege for cloud infrastructure as code
Infrastructure as code (IaC) for the cloud, which automatically configures a system’s cloud environment from source code, is an important practice...
-
Are chrome extensions compliant with the spirit of least privilege?
Extensions are small applications installed by users and enrich the user experience of browsing the Internet. Browsers expose a set of restricted...
-
Least Privilege Learning for Attribute Obfuscation
As machine learning systems become ever more prevalent in everyday life, the need to secure such systems is becoming a critically important area in... -
-
Enabling Lightweight Privilege Separation in Applications with MicroGuards
Application compartmentalization and privilege separation are our primary weapons against ever-increasing security threats and privacy concerns on... -
Perception and privilege
Inequality perceptions differ along racial and gendered lines. To explain these disparities, we propose an agent-based model of localised perceptions...
-
Privilege Elevation
By default, applications on macOS run with the privileges of the currently logged in user. Different users might have different rights with respect... -
Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes
Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing in recent years. In particular, if administrator...
-
Software Security—Exploits and Privilege Escalation
Here we consider common methods that exploit vulnerabilities in (typically non-security) software programs, through abuse of features in programming... -
Identifying the most accurate machine learning classification technique to detect network threats
Insider threats have recently become one of the most urgent cybersecurity challenges facing numerous businesses, such as public infrastructure...
-
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks
As the rising popularity of Bitcoin, people tend to use Bitcoin wallets to manage the keys for spending or receiving funds. Instead of generating...
-
Methodological Proposal for Privilege Escalation in Windows Systems
One of the operating systems most used today is Windows, created by the Microsoft company since its launch on November 20, 1985. As a result of the... -
Privilege Escalation
Once we have established an authenticated session of any type, whether the session is legitimate or hacked via any of the attacks previously... -
A novel two phase data sensitivity based access control framework for healthcare data
This paper proposes a secure data access control framework that utilizes the attribute values and the user specific usage details to provide secure...
-
Kubernetes RBAC
In this chapter, we will learn about the Role-Based Access Control capabilities that Kubernetes offers so that we can grant access to various types... -
Access Control and Privilege Management
In this chapter you will learn about fundamental concepts along with best practices of authorization and access control. You will also gain an... -
Optimus: association-based dynamic system call filtering for container attack surface reduction
While container adoption has witnessed significant growth in facilitating the operation of large-scale applications, this increased attention has...
-
Enhancement and formal verification of the ICC mechanism with a sandbox approach in android system
Inter-Component Communication (ICC) plays a crucial role in facilitating information exchange and functionality integration within the complex...
-
Software Security—Exploits and Privilege Escalation
Here we discuss known methods to exploit common security vulnerabilities in programs. The focus of software security (versus, e.g., security... -
Managing Accounts and Security
As data becomes more and more important for the organization and with the sharp rise in cybercrime, data security is a major concern for every...