O'Reilly logo

Secure Programming with Static Analysis by Jacob West, Brian Chess

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

12. Privileged Programs

Nearly all men can stand adversity, but if you want to test a man’s character, give him power.

–ABRAHAM LINCOLN

Most programs execute with a set of privileges inherited from the user who runs them. For example, a text editor can display only files that its user has permission to read. Some programs carry additional privileges that enable them to perform operations that their users would otherwise be prevented from performing. These are privileged programs.

When written properly, a privileged program grants regular users a limited amount of access to some shared resource, such as physical memory, a hardware device, or special files such as the password file or the mail queue. When written improperly, a vulnerable privileged ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required