Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Privilege separation

Known as: Dropping root, Privileges drop, Privileges-drop 
In computer programming and computer security, privilege separation is a technique in which a program is divided into parts which are limited to the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Application containers, such as those provided by Docker, have recently gained popularity as a solution for agile and seamless… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Highly Cited
2016
Highly Cited
2016
Mobile applications are increasingly integrating third-party libraries to provide various features, such as advertising… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • table III
Highly Cited
2015
Highly Cited
2015
Monolithic operating system designs undermine the security of computing systems by allowing single exploits anywhere in the… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Highly Cited
2012
Highly Cited
2012
Advertising is a critical part of the Android ecosystem---many applications use one or more advertising services as a source of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2012
Highly Cited
2012
The standard approach for privilege separation in web applications is to execute application components in different web origins… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2010
2010
Legacy desktop applications – the applications in use on most desktops today – often process data from multiple untrusted sources… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Highly Cited
2008
Highly Cited
2008
Software vulnerabilities and bugs persist, and so exploits continue to cause significant damage, particularly by divulging users… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2006
Highly Cited
2006
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2004
Highly Cited
2004
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
We introduce a system that eliminates the need to run programs in privileged process contexts. Using our system, programs run… Expand
  • figure 3
  • figure 4
  • table 1
  • table 2