Publisher
Springer Nature Switzerland
Reference19 articles.
1. Marchand-Melsom, A., Nguyen Mai, D.B.: Automatic repair of OWASP top 10 security vulnerabilities: a survey. In: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops (ICSEW 2020), pp. 23–30. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3387940.3392200
2. Provos, N., Friedl, M., Honeyman, P.: Preventing privilege escalation. In: 12th USENIX Security Symposium (USENIX Security 03). USENIX Association, Washington, D.C. (2003). https://www.usenix.org/conference/12th-usenix-security-symposium/preventing-privilege-escalation
3. Rahmansyah, R., Suryani, V., Arif Yulianto, F., Hidayah Ab Rahman, N.: Reducing docker daemon attack surface using rootless mode. In: 2021 International Conference on Software Engineering and Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM), pp. 499–502 (2021). https://doi.org/10.1109/ICSECS52883.2021.00097
4. Binnie, C.: Get Permission from Your Peers with Sudo, pp. 127–134. Apress, Berkeley (2016). https://doi.org/10.1007/978-1-4842-1772-6_13
5. Dmitry, M., Elena, P.: Linux Privilege Increase Threat Analysis. In: 2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), pp. 579–581 (2020). https://doi.org/10.1109/USBEREIT48449.2020.9117739