Research and Test on User Privilege Elevation Method in Windows 8

2014 ◽  
Vol 610 ◽  
pp. 752-755
Author(s):  
Jiang Du ◽  
Hao Wang ◽  
Jia Yu Yang

Windows 8 is the latest release of Microsoft operating system, the user interface, function and safety have been greatly improved. The user privilege has played a part in operating system security, which can greatly prevent worm programs. The Windows 8 privilege management inherits from Windows Vista’s UAC (User Account Control) system and improved it. Now there are two types of method to elevate user privilege, one is aim at the UAC in Ring 3 mode, the other is attack the kernel of operating system in Ring 0 mode. This paper is primarily analyzing and testing these methods.

2015 ◽  
Vol 26 (1) ◽  
pp. 6-24 ◽  
Author(s):  
Christian Röpke ◽  
Thorsten Holz

2003 ◽  
Vol 18 (3) ◽  
pp. 291-306 ◽  
Author(s):  
Cheryl L. Dunn ◽  
Gregory J. Gerard ◽  
James L. Worrell

Systems and financial statement auditors are often responsible for evaluating compliance with system security controls as part of their annual audit procedures. This assignment provides a practical learning experience that relates your course material to actual tasks practitioners perform. You are provided with simulated data from a realistic company example and are asked practitioner-relevant questions covering a variety of issues related to network operating system access. Monitoring and limiting network operating system access and mitigating the related risk is crucial since any application (including accounting applications) can be accessed, and potentially compromised, through the network operating system.


Sign in / Sign up

Export Citation Format

Share Document