Global Information Lookup Global Information

User Interface Privilege Isolation information


User Interface Privilege Isolation (UIPI) is a technology introduced in Windows Vista and Windows Server 2008 to combat shatter attack exploits. By making use of Mandatory Integrity Control, it prevents processes with a lower "integrity level" (IL) from sending messages to higher IL processes (except for a very specific set of UI messages).[1]

Window messages are designed to communicate user action to processes. However, they can be used to run arbitrary code in the receiving process' context. This could be used by a malicious low-privilege processes to run arbitrary code in the context of a higher-privilege process, which constitutes an unauthorized privilege escalation. By restricting the ability of lower-privileged processes to send window messages to higher-privileged processes, UIPI can mitigate these kinds of attacks.[2]

UIPI, and Mandatory Integrity Control more generally, is a security feature but not a security boundary.[3]

Microsoft Office 2010 uses UIPI for its Protected View sandbox to prohibit potentially unsafe documents from modifying components, files, and other resources on a system.[4]

  1. ^ "The Windows Vista and Windows Server 2008 Developer Story: Windows Vista Application Development Requirements for User Account Control (UAC)". Microsoft. April 2007. Retrieved 2007-12-07.
  2. ^ Edgar Barbosa. "Windows Vista UIPI" (PDF). COSEINC. Archived from the original (PDF) on 2012-04-18. Retrieved 2012-04-18.
  3. ^ "Microsoft Security Servicing Criteria for Windows". Microsoft.
  4. ^ Malhotra, Mike (August 13, 2009). "Protected View in Office 2010". TechNet. Microsoft. Retrieved September 22, 2017.

and 25 Related for: User Interface Privilege Isolation information

Request time (Page generated in 0.8611 seconds.)

User Interface Privilege Isolation

Last Update:

User Interface Privilege Isolation (UIPI) is a technology introduced in Windows Vista and Windows Server 2008 to combat shatter attack exploits. By making...

Word Count : 238

User Account Control

Last Update:

higher-privilege ones, another new technology, User Interface Privilege Isolation, is used in conjunction with User Account Control to isolate these processes...

Word Count : 3490

Shatter attack

Last Update:

Windows 10 Creators Update. User Interface Privilege Isolation Mandatory Integrity Control Principle of least privilege Capability-based security "Exploiting...

Word Count : 828

Mandatory Integrity Control

Last Update:

well as for defining the boundary for window messages in the User Interface Privilege Isolation (UIPI) technology, Mandatory Integrity Control is used by...

Word Count : 1020

System Integrity Protection

Last Update:

engineering (security) Trusted Computing Trusted Solaris User Account Control User Interface Privilege Isolation Windows File Protection Cunningham, Andrew; Hutchinson...

Word Count : 1263

Adobe Acrobat version history

Last Update:

application written by Adobe Systems for the Windows 8/RT Metro Style interface. The current versions offers only basic PDF reading features, subsequent...

Word Count : 2918

Device driver

Last Update:

such as network interface cards. The primary benefit of running a driver in user mode is improved stability, since a poorly written user-mode device driver...

Word Count : 2911

Microsoft Office 2010

Last Update:

later versions of Windows, Mandatory Integrity Control and User Interface Privilege Isolation further restrict the separate process. Protected View is also...

Word Count : 13678

Operating system

Last Update:

security by obscurity. A user interface (UI) is essential to support human interaction with a computer. The two most common user interface types for any computer...

Word Count : 11002

DeskSpace

Last Update:

Administrator permissions to run, applications that implement User Interface Privilege Isolation, such as Internet Explorer 7 and Internet Explorer 8, and...

Word Count : 482

Technical features new to Windows Vista

Last Update:

covering most aspects of the operating system. In addition to the new user interface, security capabilities, and developer technologies, several major components...

Word Count : 10874

Linux namespaces

Last Update:

values in the caller's UTS namespace." User namespaces are a feature to provide both privilege isolation and user identification segregation across multiple...

Word Count : 1599

Features new to Windows Vista

Last Update:

Mandatory Integrity Control, Parental Controls, User Account Control, User Interface Privilege Isolation, and Windows Defender. Windows Firewall is significantly...

Word Count : 13920

Windows Vista

Last Update:

operating system. New features of Windows Vista include a graphical user interface and visual style referred to as Windows Aero; a content index and desktop...

Word Count : 16501

Windows Vista networking technologies

Last Update:

with an icon representing the device, allowing users one-click access to the device's user interface. When LLTD is invoked, it provides metadata about...

Word Count : 6799

Active Directory

Last Update:

features of Active Directory via the COM interfaces provided by Active Directory Service Interfaces. To allow users in one domain to access resources in another...

Word Count : 5296

IBM i

Last Update:

addition to adding support for System/36 applications, some of the user interface and ease-of-use features from the System/36 were carried over to the...

Word Count : 4884

Architecture of Windows NT

Last Update:

and play (PnP) hardware bus. User mode is made up of various system-defined processes and DLLs. The interface between user mode applications and operating...

Word Count : 4197

List of features removed in Windows Vista

Last Update:

of the folder or file. This no longer works as a result of User Interface Privilege Isolation. When using Windows Aero, all GDI, GDI+ and DirectDraw applications...

Word Count : 13301

Google Chrome

Last Update:

information (such as version, name, description, privileges, etc.), and other files for the user interface (icons, popups, etc.). Google has an official...

Word Count : 17444

List of Microsoft Windows components

Last Update:

collects telemetry information. DMRC (Device Metadata Retrieval Client) interfaces to metadata about devices from Windows 7 onwards. I/O technologies Macro...

Word Count : 1086

Security and safety features new to Windows Vista

Last Update:

malicious code or spoof the user interface, by preventing unauthorized processes from sending messages to high privilege processes. Any process that wants...

Word Count : 5891

Multilevel security

Last Update:

start of this article), the system must provide a user interface that is capable of allowing a user to access and process content at multiple classification...

Word Count : 4178

Direct Rendering Manager

Last Update:

subsystem of the Linux kernel responsible for interfacing with GPUs of modern video cards. DRM exposes an API that user-space programs can use to send commands...

Word Count : 10074

Genode

Last Update:

control interfaces, and frontends to the Genode package manager. The system does not feature a full desktop environment, but requires users to deploy...

Word Count : 1230

PDF Search Engine © AllGlobal.net