SE547: BDDs: Software Security [2/22] Previous pageContentsNext page

Secure software is intended to grant rights to users acting in certain roles.

What are examples of rights and roles?

Incorrect software can result in rights escalation. What is this? What are examples?

What are common strategies for attackers achieving rights escalation?

What can we do about these attacks?

Previous pageContentsNext page