Setuid
Top View
- The Murky Issue of Changing Process Identity: Revising “Setuid Demystified”
- Linux Authentication and Access Control 5-2
- Secure Programming; Sandboxing Becoming Root
- Exploiting Capabilities Parcel Root Power, the Dark Side of Capabilities
- Set-UID Privileged Programs: 1
- Polper: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications
- Sandboxing Linux Code to Mitigate Exploitation
- Absolute Openbsd: UNIX for the Practical Paranoid
- CIS Red Hat Enterprise Linux 7 Benchmark V1.1.0 - 04-02-2015
- Chroot Sandbox Vulnerability Lab
- X/Open Guide
- Openbsd Frequently Asked Questions
- Networking and Security with Linux
- Acquiring Privileges
- Magnicomp's Sysinfo Root Setuid() Local Privilege Escalation Vulnerability
- Freebsd and Openbsd Are Increasingly Gaining Traction In
- Setuid Demystified
- Openbsd Frequently Asked Questions