One particularly difficult challenge in the computer security landscape is preventing privilege escalation. This type of attack happens when an actor is granted access to some piece of hardware with limited permissions but manages to circumvent the security policies meant to contain them. Although a simple bug in the operating system, or even in user libraries, can be sufficient to enable this type of attack, such a vulnerability is also relatively easy to fix. Privilege escalation mechanisms represent a more challenging security risk because they are methods by which generic vulnerabilities (such as a buffer overflow) can be leveraged to escalate privilege. This thesis describes a collection of operating system hardening techniques designe...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Privilege based security policies for programs are effective as a first line of defense against atta...
Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing...
Many operating system services require special privileges to execute their tasks. A programming erro...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Vulnerabilities in Android kernel give opportunity for attacker to damage the system. Privilege esca...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
The need to secure software systems is more important than ever. However, while a lot of work exists...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
A privilege escalation in the Windows system can be defined as a method of gaining access to the ker...
The UEFI specification has more tightly coupled the bonds of the operating system and the platform f...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Privilege based security policies for programs are effective as a first line of defense against atta...
Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing...
Many operating system services require special privileges to execute their tasks. A programming erro...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Vulnerabilities in Android kernel give opportunity for attacker to damage the system. Privilege esca...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
The need to secure software systems is more important than ever. However, while a lot of work exists...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
A privilege escalation in the Windows system can be defined as a method of gaining access to the ker...
The UEFI specification has more tightly coupled the bonds of the operating system and the platform f...
Monolithic kernels have been the traditional design choice of many modern operating systems for prac...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Privilege based security policies for programs are effective as a first line of defense against atta...