Containing a Confused Deputy on x86: A Survey of Privilege Escalation Mitigation Techniques

Abstract

The weak separation between user- and kernelspace in modern operating systems facilitates several forms of privilege escalation. This paper provides a survey of protection techniques, both cutting-edge and time-tested, used to prevent common privilege escalation attacks. The techniques are compared against each other in terms of their effectiveness, their performance impact, the complexity of their implementation, and their impact on diversification techniques such as ASLR. Overall the literature provides a litany of disjoint techniques, each of which trades some performance cost for effectiveness against a particular isolated threat. No single technique was found to effectively mitigate all known and potential attack vectors with reasonable performance cost overhead.

Authors and Affiliations

Scott Brookes, Stephen Taylor

Keywords

Related Articles

A Novel Design of Patch Antenna using U-Slot and Defected Ground Structure

A novel design of patch antenna is presented with double U slot structure on patch with ground irregularities. As a result tri-band response is achieved with gain reaching 0.785 to 3.75dB respectively and directivity of...

Storage Consumption Reduction using Improved Inverted Indexing for Similarity Search on LINGO Profiles

Millions of compounds which exist in huge datasets are represented using Simplified Molecular-Input Line- Entry System (SMILES) representation. Fragmenting SMILES strings into overlapping substrings of a defined size cal...

An Effective Identification of Species from DNA Sequence: A Classification Technique by Integrating DM and ANN

Species classification from DNA sequences remains as an open challenge in the area of bioinformatics, which deals with the collection, processing and analysis of DNA and proteomic sequence. Though incorporation of data m...

Preference in using Agile Development with Larger Team Size

Agile software development includes a group of software development methodologies based on iterative development, where requirements and solutions evolve through collaboration between cross-functional self-organizing tea...

Usability of “Traysi”: A Web Application for Tricycle Commuters

This study measured the usability of a web application for tricycle commuters that was developed using Hypertext Markup Language (HTML), Cascading Style Sheet (CSS) and Javascript (JS) with the aid of Google Artificial P...

Download PDF file
  • EP ID EP149092
  • DOI 10.14569/IJACSA.2016.070463
  • Views 106
  • Downloads 0

How To Cite

Scott Brookes, Stephen Taylor (2016). Containing a Confused Deputy on x86: A Survey of Privilege Escalation Mitigation Techniques. International Journal of Advanced Computer Science & Applications, 7(4), 476-484. https://europub.co.uk/articles/-A-149092