Proceedings of the Ninth European Conference on Computer Systems 2014
DOI: 10.1145/2592798.2592811
|View full text |Cite
|
Sign up to set email alerts
|

Practical techniques to obviate setuid-to-root binaries

Abstract: Trusted, setuid-to-root binaries have been a substantial, long-lived source of privilege escalation vulnerabilities on Unix systems. Prior work on limiting privilege escalation has only considered privilege from the perspective of the administrator, neglecting the perspective of regular users-the primary reason for having setuid-to-root binaries.The paper presents a study of the current state of setuidto-root binaries on Linux, focusing on the 28 most commonly deployed setuid binaries in the Debian and Ubuntu … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Several approaches [11,17,28] have investigated the status of setuid system calls and identified their semantic inconsistency. This problem occurred with human errors because they were insufficiently documented and poorly designed.…”
Section: Related Workmentioning
confidence: 99%
“…Several approaches [11,17,28] have investigated the status of setuid system calls and identified their semantic inconsistency. This problem occurred with human errors because they were insufficiently documented and poorly designed.…”
Section: Related Workmentioning
confidence: 99%
“…In other words, the same vulnerability described earlier exists for all applications involved with authentication such as login and su. By the way, the same problem exists in project Protego [7], which spares no effort to deprivilege privileged codes.…”
Section: Related Workmentioning
confidence: 99%
“…Debian packages have been analyzed to study the evolution of the software itself [29,37,45], to measure the popularity of application programming languages [10], to analyze dependencies between the packages [23], to identify trends in package sizes [12], the number of developers involved in developing and maintaining a package [44], and estimating the cost of development [11]. Jain et al used popularity contest survey data to prioritize the implementation effort for new system security policies [33]. This study is unique in using this information to infer the relative importance of of system APIs to end users, based on frequency of application installation.…”
Section: Related Workmentioning
confidence: 99%