TOCTTOU vulnerabilities in UNIX-style file systems: an anatomical study
暂无分享,去创建一个
Calton Pu | Jinpeng Wei | C. Pu | Jinpeng Wei
[1] Alan J. Hu,et al. Fixing Races for Fun and Profit: How to Use access(2) , 2004, USENIX Security Symposium.
[2] Dawson R. Engler,et al. Checking system rules using system-specific, programmer-written compiler extensions , 2000, OSDI.
[3] Dawson R. Engler,et al. RacerX: effective, static detection of race conditions and deadlocks , 2003, SOSP '03.
[4] Matt Bishop,et al. Checking for Race Conditions in File Accesses , 1996, Comput. Syst..
[5] Matt Bishop,et al. Race Conditions, Files, and Security Flaws; or the Tortoise and the Hare Redux , 1995 .
[6] Karl N. Levitt,et al. Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.
[7] Mahadev Satyanarayanan,et al. Scale and performance in a distributed file system , 1988, TOCS.
[8] Mahadev Satyanarayanan,et al. Scale and performance in a distributed file system , 1987, SOSP '87.
[9] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[10] Michael Burrows,et al. Eraser: a dynamic data race detector for multithreaded programs , 1997, TOCS.
[11] Eugene Tsyrklevich,et al. Dynamic Detection and Prevention of Race Conditions in File Accesses , 2003, USENIX Security Symposium.
[12] Darrell D. E. Long,et al. Noah: low-cost file access prediction through pairs , 2001, Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210).
[13] R. P. Abbott,et al. Security Analysis and Enhancements of Computer Operating Systems , 1976 .
[14] Scott A. Brandt,et al. Performing file prediction with a program-based successor model , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[15] Crispin Cowan,et al. RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities , 2001, USENIX Security Symposium.