Information Systems Security
DOI: 10.1007/978-3-540-77086-2_24
|View full text |Cite
|
Sign up to set email alerts
|

Towards Automated Privilege Separation

Abstract: Abstract. Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to protected resources, we can mitigate the threats against the application. Previous examinations of privilege separation either entailed significant manual effort or required access to the source code. We consider a method of performing privilege separation through black-box analysis. We consider similar applications to the tar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…It is also more limited, as the partitions are more rigidly defined. Bapat et al [3] investigate the automatic specification of the privileged Systrace segments using black box analysis. Similarly to Systrace, the Privman library [21] provides a systematic and reusable approach for partitioning operations that require higher privileges through the provided API.…”
Section: Privilege Separationmentioning
confidence: 99%
“…It is also more limited, as the partitions are more rigidly defined. Bapat et al [3] investigate the automatic specification of the privileged Systrace segments using black box analysis. Similarly to Systrace, the Privman library [21] provides a systematic and reusable approach for partitioning operations that require higher privileges through the provided API.…”
Section: Privilege Separationmentioning
confidence: 99%