<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=User_Interface_Privilege_Isolation</id>
	<title>User Interface Privilege Isolation - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://debianws.lexgopc.com/wiki143/index.php?action=history&amp;feed=atom&amp;title=User_Interface_Privilege_Isolation"/>
	<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=User_Interface_Privilege_Isolation&amp;action=history"/>
	<updated>2026-05-04T18:23:26Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>http://debianws.lexgopc.com/wiki143/index.php?title=User_Interface_Privilege_Isolation&amp;diff=4822774&amp;oldid=prev</id>
		<title>imported&gt;Citation bot: Add: website. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | #UCB_webform 1480/3352</title>
		<link rel="alternate" type="text/html" href="http://debianws.lexgopc.com/wiki143/index.php?title=User_Interface_Privilege_Isolation&amp;diff=4822774&amp;oldid=prev"/>
		<updated>2023-03-27T08:43:13Z</updated>

		<summary type="html">&lt;p&gt;Add: website. | &lt;a href=&quot;/wiki143/index.php?title=WP:UCB&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;WP:UCB (page does not exist)&quot;&gt;Use this bot&lt;/a&gt;. &lt;a href=&quot;/wiki143/index.php?title=WP:DBUG&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;WP:DBUG (page does not exist)&quot;&gt;Report bugs&lt;/a&gt;. | Suggested by Whoop whoop pull up | #UCB_webform 1480/3352&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|Security technology in Microsoft Windows}}&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;User Interface Privilege Isolation&amp;#039;&amp;#039;&amp;#039; (&amp;#039;&amp;#039;&amp;#039;UIPI&amp;#039;&amp;#039;&amp;#039;) is a technology introduced in [[Windows Vista]] and [[Windows Server 2008]] to combat [[shatter attack]] exploits. By making use of [[Mandatory Integrity Control]], it prevents processes with a lower &amp;quot;integrity level&amp;quot; (IL) from sending messages to higher IL processes (except for a very specific set of UI messages).&amp;lt;ref name=&amp;quot;msdn&amp;quot;&amp;gt;{{cite web&lt;br /&gt;
|url=http://msdn2.microsoft.com/en-us/library/aa905330.aspx&lt;br /&gt;
|title=The Windows Vista and Windows Server 2008 Developer Story: Windows Vista Application Development Requirements for User Account Control (UAC)&lt;br /&gt;
|publisher=[[Microsoft]]&lt;br /&gt;
|date=April 2007&lt;br /&gt;
|access-date=2007-12-07&lt;br /&gt;
}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Window messages are designed to communicate user action to processes. However, they can be used to [[arbitrary code execution|run arbitrary code]] in the receiving process&amp;#039; context. This could be used by a malicious low-privilege processes to run arbitrary code in the context of a higher-privilege process, which constitutes an unauthorized [[privilege escalation]]. By restricting the ability of lower-privileged processes to send window messages to higher-privileged processes, UIPI can mitigate these kinds of attacks.&amp;lt;ref name=&amp;quot;coseinc&amp;quot;&amp;gt;{{cite web&lt;br /&gt;
|url=https://www.coseinc.com/en/index.php?rt=download&amp;amp;act=publication&amp;amp;file=Vista_UIPI.ppt.pdf&lt;br /&gt;
|archive-url=https://web.archive.org/web/20120418173959/https://www.coseinc.com/en/index.php?rt=download&amp;amp;act=publication&amp;amp;file=Vista_UIPI.ppt.pdf&lt;br /&gt;
|url-status=dead&lt;br /&gt;
|archive-date=2012-04-18&lt;br /&gt;
|title=Windows Vista UIPI &lt;br /&gt;
|author=Edgar Barbosa&lt;br /&gt;
|publisher=COSEINC&lt;br /&gt;
|access-date=2012-04-18&lt;br /&gt;
}} &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
UIPI, and Mandatory Integrity Control more generally, is a security feature but not a security &amp;#039;&amp;#039;boundary&amp;#039;&amp;#039;.&amp;lt;ref name=&amp;quot;msrc&amp;quot;&amp;gt;{{cite web&lt;br /&gt;
|url=https://www.microsoft.com/en-us/msrc/windows-security-servicing-criteria&lt;br /&gt;
|title=Microsoft Security Servicing Criteria for Windows&lt;br /&gt;
|website=[[Microsoft]]&lt;br /&gt;
}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Microsoft Office 2010]] uses UIPI for its Protected View [[Sandbox (computer security)|sandbox]] to prohibit potentially unsafe documents from modifying components, files, and other resources on a system.&amp;lt;ref name=&amp;quot;ProtectedView&amp;quot;&amp;gt;{{cite web |url=https://blogs.technet.microsoft.com/office2010/2009/08/13/protected-view-in-office-2010/ |title=Protected View in Office 2010 |last=Malhotra |first=Mike |date=August 13, 2009 |publisher=[[Microsoft]] |work=[[Microsoft TechNet|TechNet]] |access-date=September 22, 2017}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Windows Components}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Windows Vista]]&lt;br /&gt;
[[Category:Microsoft Windows security technology]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Citation bot</name></author>
	</entry>
</feed>