Skip to search formSkip to main contentSkip to account menu

Privilege separation

Known as: Dropping root, Privileges drop, Privileges-drop 
In computer programming and computer security, privilege separation is a technique in which a program is divided into parts which are limited to the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
—Mobile applications are increasingly integrating third-party libraries to provide various features, such as advertising… 
Highly Cited
2015
Highly Cited
2015
Monolithic operating system designs undermine the security of computing systems by allowing single exploits anywhere in the… 
Highly Cited
2012
Highly Cited
2012
Advertising is a critical part of the Android ecosystem---many applications use one or more advertising services as a source of… 
Highly Cited
2012
Highly Cited
2012
The standard approach for privilege separation in web applications is to execute application components in different web origins… 
Review
2012
Review
2012
Recent years have witnessed incredible growth in the popularity and prevalence of smart phones. A flourishing mobile application… 
2010
2010
Legacy desktop applications – the applications in use on most desktops today – often process data from multiple untrusted sources… 
Highly Cited
2008
Highly Cited
2008
Software vulnerabilities and bugs persist, and so exploits continue to cause significant damage, particularly by divulging users… 
Highly Cited
2006
Highly Cited
2006
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information… 
Highly Cited
2004
Highly Cited
2004
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged… 
Highly Cited
2003
Highly Cited
2003
We introduce a system that eliminates the need to run programs in privileged process contexts. Using our system, programs run…