Privilege level

Known as: Current privilege level, Descriptor Privilege Level, Requester Privilege Level 
A privilege level in the x86 instruction set controls the access of the program currently running on the processor to resources such as memory… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1996-2016
0246819962016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Privilege separation has long been considered as a fundamental principle in software design to mitigate the potential damage of a… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2015
2015
Monolithic operating system designs undermine the security of computing systems by allowing single exploits anywhere in the… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2013
2013
1383-7621/$ see front matter 2013 Elsevier B.V. A http://dx.doi.org/10.1016/j.sysarc.2013.04.002 q This is an extension of paper… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
A new low-complexity approach to intrusion detection called "bottleneck verification" was developed which can find novel attacks… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Virtualization is a hot topic in operating systems these days. It is useful in many scenarios: server consolidation, virtual test… (More)
  • figure 1
  • figure 2
Is this relevant?
2009
2009
Components of commodity OS kernels typically execute at the same privilege level. Consequently, the compromise of even a single… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2009
2009
The invention The invention relates to a virtual monitor and method for virtualizing a " non-privileged " computer instruction… (More)
Is this relevant?
2005
2005
In the whole system composed by traditional OS and the applications above,the states are distributed into each layer of the… (More)
  • figure 1
Is this relevant?
2004
2004
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of… (More)
  • figure 1
Is this relevant?