摘要: Setuid programs are often exploited by malicious attackers to obtain unauthorized access local systems. programs, especially owned the root user, granted privileges, allowing gain privileges exploiting vulnerabilities in setuid-root programs. The usually lie code that does not require privileges. Nevertheless, entire of is This paper presents a scheme called privileged minimization reduces risk setuid In this scheme, divided into and non-privileged code. Privileged while not. size trusted computing base (TCB) because it running with reducing chances gaining subverting Protection between nonprivileged enforced fine-grained protection domains: novel mechainsm operating system proposed authors.