Setuid

Known as: Sgid, SUID, Set user id 
setuid and setgid (short for "set user ID upon execution" and "set group ID upon execution", respectively) are Unix access rights flags that allow… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Trusted, setuid-to-root binaries have been a substantial, long-lived source of privilege escalation vulnerabilities on Unix… (More)
Is this relevant?
2012
2012
The standard loader (ld.so) is a common target of attacks. The loader is a trusted component of the application, and faults in… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table III
Is this relevant?
2008
2008
Dropping unneeded process privileges promotes security, b u is notoriously error-prone due to confusing set ∗id system calls with… (More)
Is this relevant?
2004
2004
Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs… (More)
  • table 1
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We introduce a system that eliminates the need to run programs in privileged process contexts. Using our system, programs run… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Access control in Unix systems is mainly based on user IDs, yet the system calls that modify user IDs ( uid-setting system calls… (More)
Is this relevant?
2001
2001
Setuid programs can pose a grave threat to UNIX systems because they explicitly violate the protection scheme designed into UNIX… (More)
Is this relevant?
2000
2000
Teen die agtergrond van die voorgemelde benaderings word getoon dat UGO nie 'n paradigmaskuif meebring nie. UGO kan ten beste… (More)
  • table 1
  • table 2
Is this relevant?
1997
1997
In the commercial sector, security analysis has traditionally been applied at the network system level, after release, using… (More)
Is this relevant?
1989
1989
The UNIX setuid mechanism is described in the context of the GEMSOS architecture. Motivation for modeling setuid is given… (More)
  • table 1
Is this relevant?