Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Privilege separation

Known as: Dropping root, Privileges drop, Privileges-drop 
In computer programming and computer security, privilege separation is a technique in which a program is divided into parts which are limited to the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Mobile applications are increasingly integrating third-party libraries to provide various features, such as advertising… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • table III
Is this relevant?
2016
2016
Failing to properly isolate components in the same address space has resulted in a substantial amount of vulnerabilities… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Monolithic operating system designs undermine the security of computing systems by allowing single exploits anywhere in the… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Advertising is a critical part of the Android ecosystem---many applications use one or more advertising services as a source of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The standard approach for privilege separation in web applications is to execute application components in different web origins… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2010
2010
Legacy desktop applications – the applications in use on most desktops today – often process data from multiple untrusted sources… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Software vulnerabilities and bugs persist, and so exploits continue to cause significant damage, particularly by divulging users… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
Abstract : We extend the separation kernel abstraction to represent the enforcement of the principle of least privilege. In… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We introduce a system that eliminates the need to run programs in privileged process contexts. Using our system, programs run… Expand
  • figure 3
  • figure 4
  • table 1
  • table 2
Is this relevant?