
2  DEVELOPMENT OF NEW 
TAXONOMIC CHARACTERS 
The basis for successful classification is appropriate 
taxonomic characters (Simpson, 1961; Glass and 
Vessey, 1995). Therefore, it is important for 
improving existing vulnerability taxonomies to 
extract new taxonomic characters. 
2.1 Privilege Escalation 
Through analyzing prevalent attack methods and 
large numbers of vulnerabilities, we detect that most 
vulnerabilities have the following characters: an 
attacker in the low user-level L usually exploits a or 
several vulnerabilities successfully to get a certain 
privilege escalation, and then, arrives at the high 
user-level H without authorization. Obviously, the 
attacker’s illegal escalation from L to H seriously 
threatens the security of computer system. 
In the whole process of exploitation, an attacker 
often plays a certain role of system user and owns 
the corresponding user privilege-set. From a visitor 
to a system use, finally to a system administrator, the 
change of an attacker’s role reflects the variety in his 
owning system resources, namely the variety in his 
privileges. Therefore, based on the above practical 
experiences and the idea that different roles of 
system users have their privileges of different degree 
in operating system design, this paper introduces a 
new taxonomic character
the attribute of 
‘privilege-set’. Definition 2.1 and 2.2 give separately 
the concept of privilege, privilege-set (Pset) and 
privilege escalation (P-E) (Wang, 2002). 
Definition 2.1 A privilege is a (x,m). Where, x is 
an object, m is a set of accessing modes of the 
subject to that object and m isn’t null. 
Pset={(xi,mi)|(xi,mi) is a privilege, i=1~n}. We use 
Psubset to express any subset of Pset. 
Definition 2.2 If a user ‘Name’ owning Pset 
exploits a certain vulnerability to gain a new Pset’, 
and, 
∃
x’,m’
≠
, make (x’,m’)
∈
Pset’ 
∧
 
(x’,m’)
∉
Pset, then we argue that ‘Name’ makes a 
privilege escalation.   
To an attacker, he exploits vulnerabilities to 
attack the computer system with the purpose of 
obtaining much more privileges. On the other hand, 
to a vulnerability, it is significant only if it gives an 
attacker more privileges. 
2.2 User-Pset Relationship 
As for a certain subject (user or user’s process) in 
system, its owning permissions which authorize it to 
access all operable objects in system are a Pset. 
Hence, every subject can be regarded as a naming 
Pset. We can use (name,Pname) to express the 
correspondence of a subject (user) to a Pset. Here, 
‘name’ means a user’s name, and ‘Pname’ is the 
corresponding Pset of name. To a user ‘name’ in 
system, its default privilege-set is certain. So in the 
condition of the legal access, (name,Pname) is 
certain. 
2.3 Classification of Psets 
In (Longstaff, 1997), longstaff presents a taxonomy 
to classify all visitors of computer, and he uses 
Selection Decision Tree (SDT) to divide all visitor 
into the following five classes: Remote using a 
common service, Trusted system, User account, 
Physical access and Privileged access. In this paper, 
we use the above taxonomy of visitors for reference, 
and from the other angle, combine visitors with Psets 
to classify Psets of all possible users in system by 
user’s roles. We also adopt the method of SDT to 
make this classification. SDT for user’s role 
classification is given in Figure 1. 
Figure 1: Selection decision tree for user’s role 
classification 
In Figure 1, the current user is a broad 
conception, and includes all possible users related to 
the objective system, such as system accounts, 
trusted or distrusted remote visitors, etc. Common 
user is any system account except system 
administrator. Table 1 shows the ranks and 
A NEW VULNERABILITY TAXONOMY BASED ON PRIVILEGE ESCALATION
597