{ChainReactor}: Automated Privilege Escalation Chain Discovery via {AI} Planning
Current academic vulnerability research predominantly focuses on identifying individual
bugs and exploits in programs and systems. However, this goes against the growing trend of …
bugs and exploits in programs and systems. However, this goes against the growing trend of …
Decap: Deprivileging programs by reducing their capabilities
Linux enables non-root users to perform certain privileged operations through the use of the
setuid (“set user ID”) mechanism. This represents a glaring violation of the principle of least …
setuid (“set user ID”) mechanism. This represents a glaring violation of the principle of least …
[PDF][PDF] Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences
Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall
Sequences Page 1 Hugo Kermabon-Bobinnec* Yosr Jarraya † , Lingyu Wang*, Suryadipta …
Sequences Page 1 Hugo Kermabon-Bobinnec* Yosr Jarraya † , Lingyu Wang*, Suryadipta …
Privilege Reduction: Deprivileging Programs by Reducing Their Capabilities
MM Hasan - 2023 - search.proquest.com
In the digitized world, the demand for different software functionality has grown immensely.
Often this includes many unnecessary features, system calls, and extra privileges to the …
Often this includes many unnecessary features, system calls, and extra privileges to the …
TTY Session Audit Techniques for Linux Platform
SH Han - IEEE/ACIS International Conference on Big Data …, 2022 - Springer
Malicious attackers in an enterprise environment have a higher percentage of internal than
external. This is because it is easy for internal users to gather service environment …
external. This is because it is easy for internal users to gather service environment …
Practical Type and Memory Safety Violation Detection Mechanisms
Y Jeon - 2020 - search.proquest.com
Abstract System programming languages such as C and C++ are designed to give the
programmer full control over the underlying hardware. However, this freedom comes at the …
programmer full control over the underlying hardware. However, this freedom comes at the …
소프트웨어 타입 및 메모리 안전 강화 연구
Y Jeon - Review of KIISC, 2021 - koreascience.kr
Abstract C/C++ 언어는 빠른 속도를 가지는 저 수준 (low-level) 언어로 운영체제, 응용
프로그램, 인공지능 라이브러리 및 IoT 장비 운영체제 등 광범위한 분야에서 사용되고 있다 …
프로그램, 인공지능 라이브러리 및 IoT 장비 운영체제 등 광범위한 분야에서 사용되고 있다 …
THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL
Z Shen - 2020 - search.proquest.com
Although current augmented, virtual, and mixed reality (AR/VR/MR) systems are facing
advanced and immersive experience in the entertainment industry with countless media …
advanced and immersive experience in the entertainment industry with countless media …