Privilege escalation

Known as: Jailbreak, Priviledge escalation, Elevation of Privilege (computing) 
Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Row hammer attacks exploit electrical interactions between neighboring memory cells in high-density dynamic random-access memory… (More)
Is this relevant?
2016
2016
Protecting data on android platform against privilege escalation attack Hwan-Taek Lee, Dongjin Kim, Minkyu Park & Seong-je Cho a… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Android is a fast evolving system, with new updates coming out one after another. These updates often completely overhaul a… (More)
  • figure 1
  • table I
  • table II
  • table III
  • figure 2
Is this relevant?
2014
2014
Google’s Android is one of the most popular mobile operating system platforms today, being deployed on a wide range of mobile… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
We explore the problem of identifying unauthorized privilege escalation instances in a web application. These vulnerabilities are… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Android’s security framework has been an appealing subject of research in the last few years. Android has been shown to be… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Google Android has become a popular mobile operating system which is increasingly deployed by mobile device manufactures for… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Software vulnerabilities and bugs persist, and so exploits continue to cause significant damage, particularly by divulging users… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Many operating system services require special privilege to execute their tasks. A programming error in a privileged service… (More)
  • figure 3
  • figure 4
  • table 1
  • table 2
Is this relevant?