15 papers:
- ESOP-2015-CalzavaraBCS #detection #fine-grained
- Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions (SC, MB, SC, ES), pp. 510–534.
- ASPLOS-2015-DautenhahnKDCA #architecture #kernel #operating system
- Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation (ND, TK, WD, JC, VSA), pp. 191–206.
- ICPR-2014-MarcaciniDHR #approach #clustering #documentation #learning #metric
- Privileged Information for Hierarchical Document Clustering: A Metric Learning Approach (RMM, MAD, ERH, SOR), pp. 3636–3641.
- SIGIR-2014-VinjumurOP #reliability #reuse
- Assessing the reliability and reusability of an E-discovery privilege test collection (JKV, DWO, JHP), pp. 1047–1050.
- ASE-2013-Wu0LD #analysis #automation #component #dependence #using
- Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
- DocEng-2013-MarcaciniR #clustering #incremental
- Incremental hierarchical text clustering with privileged information (RMM, SOR), pp. 231–232.
- ICPR-2012-JiSL #multi
- Multitask multiclass privileged information support vector machines (YJ, SS, YL), pp. 2323–2326.
- OSDI-2012-BelayBMTMK #cpu #named
- Dune: Safe User-level Access to Privileged CPU Features (AB, AB, AJM, DT, DM, CK), pp. 335–348.
- ICST-2012-SprenkleCP #classification #modelling #statistics #web
- Leveraging User-Privilege Classification to Customize Usage-based Statistical Models of Web Applications (SS, CC, LLP), pp. 161–170.
- ECSA-2010-ScandariatoBJ #architecture #automation #detection
- Automated Detection of Least Privilege Violations in Software Architectures (RS, KB, WJ), pp. 150–165.
- WCRE-1999-LetarteM99a #interprocedural #modelling #php
- Extraction of Inter-procedural Simple Role Privilege Models from PHP Code (DL, EM), pp. 187–191.
- ECOOP-2005-PistoiaFKS #analysis #detection #interprocedural
- Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
- ICEIS-v3-2004-YongzhengX #taxonomy
- A New Vulnerability Taxonomy Based on Privilege Escalation (YZ, XcY), pp. 596–600.
- ICALP-2003-GorlaP #resource management
- Resource Access and Mobility Control with Dynamic Privileges Acquisition (DG, RP), pp. 119–132.
- ICSE-1985-MinskyL
- Ensuring Integrity by Adding Obligations to Privileges (NHM, AL), pp. 92–102.