翻訳と辞書
Words near each other
・ User fee
・ User Friendly
・ User Friendly (disambiguation)
・ User Friendly (horse)
・ User guide
・ User identifier
・ User illusion
・ User information
・ User information bit
・ User innovation
・ User interface
・ User interface design
・ User interface management systems
・ User interface markup language
・ User interface modeling
User Interface Privilege Isolation
・ User interface specification
・ User interface style sheet language
・ User Interface Toolkit
・ User journey
・ User Location Service
・ User model
・ User modeling
・ User onboarding
・ User operation prohibition
・ User pays
・ User profile
・ User profiles in Microsoft Windows
・ User Programmatic Interface
・ User provisioning software


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

User Interface Privilege Isolation : ウィキペディア英語版
User Interface Privilege Isolation
User Interface Privilege Isolation (UIPI) is a technology introduced in Windows Vista/2008 Server to combat shatter attack exploits. By making use of Mandatory Integrity Control, it prevents processes with a lower "integrity level" (IL) from sending messages to higher IL processes (except for a very specific set of UI messages). Window messages are designed to communicate user action to processes. However, they can be used to run arbitrary code in the receiving process' context. This can be used by a malicious low IL process to run arbitrary code in the context of a higher IL process, which constitutes an unauthorized privilege escalation. By restricting access to some vectors for code execution and data injection, UIPI can mitigate these kinds of attacks.〔 〕
UIPI, and Mandatory Integrity Control more generally, is a security feature, but not a security ''boundary''. UI Accessibility Applications can be allowed bypass UIPI by setting their "uiAccess" value to TRUE as part of their manifest file. However, for this flag to be honored by Windows UIPI, the application must be installed in the Program Files or Windows directory, and the application must be signed by a valid code signing authority. To install an application to either of these locations requires at least a user with local administrator privilege running in an elevated process with high integrity level.
Thus, malware trying to move into a position from where it can bypass UIPI must
#use a valid code signing certificate issued by Verisign or another approved code signing authority,
#perform the attack against a user with administrator privileges
#convince the user to grant use of his/her administrative privileges in the UAC prompt.
==References==


抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「User Interface Privilege Isolation」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.