Privilege separation

Known as: Dropping root, Privileges drop, Privileges-drop 
In computer programming and computer security, privilege separation is a technique in which a program is divided into parts which are limited to the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2003-2017
0520032017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Mobile applications are increasingly integrating third-party libraries to provide various features, such as advertising… (More)
  • table I
  • figure 1
  • table II
  • figure 2
  • table III
Is this relevant?
2013
2013
Privilege separation is a fundamental security concept that has been used in designing many secure systems. A number of recent… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Advertising is a critical part of the Android ecosystem---many applications use one or more advertising services as a source of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2012
2012
The standard approach for privilege separation in web applications is to execute application components in different web origins… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2012
2012
Applying privilege separation in software development is an effective strategy for limiting the damage of an attack on a software… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
2010
2010
Legacy desktop applications – the applications in use on most desktops today – often process data from multiple untrusted sources… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Software vulnerabilities and bugs persist, and so exploits continue to cause significant damage, particularly by divulging users… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Many operating system services require special privilege to execute their tasks. A programming error in a privileged service… (More)
  • figure 3
  • figure 4
  • table 1
  • table 2
Is this relevant?