Preventing Privilege Escalation
dc.contributor.author | Provos, Niels | en_US |
dc.date.accessioned | 2014-07-18T18:11:47Z | |
dc.date.available | 2014-07-18T18:11:47Z | |
dc.date.issued | 2002-08-05 | en_US |
dc.identifier.citation | Niels Provos, "Preventing Privilege Escalation," August 2002. [12th USENIX Security Symposium, Washington, D.C. (August 2003).] <http://hdl.handle.net/2027.42/107885> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107885 | |
dc.description.abstract | Many operating system services require special privileges to execute their tasks. A programming error in a privileged service may open the door to system compromise in form of unauthorized acquisition of privileges. In the worst case, a remote attacker may obtain superuser privileges. In this paper, we discuss the methodology and design of privilege separation, a generic approach that lets parts of an application run without special privileges. Programming errors occurring in these now unprivileged parts of the application can no longer be abused to gain unauthorized privileges. Privilege separation is orthogonal to capability or role-based security systems and may be used to enhance the security of such systems even further. As a concrete example, the concept of privilege separation has been implemented in OpenSSH. We illustrate how separation of privileges reduces the amount of OpenSSH code that is executed with privileges. Privilege separation would have prevented past security vulnerabilities in OpenSSH including those that were unknown at the time of its implementation. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Preventing Privilege Escalation | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107885/1/citi-tr-02-2.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.