15 papers:
ESOP-2015-CalzavaraBCS #detection #fine-grained- Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions (SC, MB, SC, ES), pp. 510–534.
ASPLOS-2015-DautenhahnKDCA #architecture #kernel #operating system- Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation (ND, TK, WD, JC, VSA), pp. 191–206.
ICPR-2014-MarcaciniDHR #approach #clustering #documentation #learning #metric- Privileged Information for Hierarchical Document Clustering: A Metric Learning Approach (RMM, MAD, ERH, SOR), pp. 3636–3641.
SIGIR-2014-VinjumurOP #reliability #reuse- Assessing the reliability and reusability of an E-discovery privilege test collection (JKV, DWO, JHP), pp. 1047–1050.
ASE-2013-Wu0LD #analysis #automation #component #dependence #using- Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
DocEng-2013-MarcaciniR #clustering #incremental- Incremental hierarchical text clustering with privileged information (RMM, SOR), pp. 231–232.
ICPR-2012-JiSL #multi- Multitask multiclass privileged information support vector machines (YJ, SS, YL), pp. 2323–2326.
OSDI-2012-BelayBMTMK #cpu #named- Dune: Safe User-level Access to Privileged CPU Features (AB, AB, AJM, DT, DM, CK), pp. 335–348.
ICST-2012-SprenkleCP #classification #modelling #statistics #web- Leveraging User-Privilege Classification to Customize Usage-based Statistical Models of Web Applications (SS, CC, LLP), pp. 161–170.
ECSA-2010-ScandariatoBJ #architecture #automation #detection- Automated Detection of Least Privilege Violations in Software Architectures (RS, KB, WJ), pp. 150–165.
WCRE-1999-LetarteM99a #interprocedural #modelling #php- Extraction of Inter-procedural Simple Role Privilege Models from PHP Code (DL, EM), pp. 187–191.
ECOOP-2005-PistoiaFKS #analysis #detection #interprocedural- Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
ICEIS-v3-2004-YongzhengX #taxonomy- A New Vulnerability Taxonomy Based on Privilege Escalation (YZ, XcY), pp. 596–600.
ICALP-2003-GorlaP #resource management- Resource Access and Mobility Control with Dynamic Privileges Acquisition (DG, RP), pp. 119–132.
ICSE-1985-MinskyL- Ensuring Integrity by Adding Obligations to Privileges (NHM, AL), pp. 92–102.