-
1
-
-
84858785590
-
-
New system calls. https://lwn.net/Articles/164887/.
-
New System Calls
-
-
-
2
-
-
84858787245
-
-
openat syscall. http://linux.die.net/man/2/openat.
-
Openat Syscall
-
-
-
6
-
-
36048930400
-
Fixing races for fun and profit: How to abuse atime
-
BORISOV, N., JOHNSON, R., SASTRY, N., AND WAGNER, D. Fixing races for fun and profit: how to abuse atime. In 14th USENIX Security Symposium (2005), pp. 303-314.
-
14th USENIX Security Symposium (2005)
, pp. 303-314
-
-
Borisov, N.1
Johnson, R.2
Sastry, N.3
Wagner, D.4
-
8
-
-
84943422723
-
An infrastructure for adaptive dynamic optimization
-
BRUENING, D., GARNETT, T., AND AMARASINGHE, S. An infrastructure for adaptive dynamic optimization. In CGO '03 (2003), pp. 265-275.
-
(2003)
CGO '03
, pp. 265-275
-
-
Bruening, D.1
Garnett, T.2
Amarasinghe, S.3
-
9
-
-
85180543366
-
Where do you want to go today? Escalating privileges by pathname manipulation
-
CHARI, S., HALEVI, S., AND VENEMA, W. Where do you want to go today? escalating privileges by pathname manipulation. In NDSS (2010).
-
(2010)
NDSS
-
-
Chari, S.1
Halevi, S.2
Venema, W.3
-
12
-
-
85084160959
-
RaceGuard: Kernel protection from temporary file race vulnerabilities
-
COWAN, C., BEATTIE, S., WRIGHT, C., AND KROAH-HARTMAN, G. RaceGuard: Kernel protection from temporary file race vulnerabilities. In Proc. 10th USENIX Security Symposium (2001), p. 12.
-
Proc. 10th USENIX Security Symposium (2001)
, pp. 12
-
-
Cowan, C.1
Beattie, S.2
Wright, C.3
Kroah-Hartman, G.4
-
16
-
-
84885639914
-
Detecting past and present intrusions through vulnerability-specific predicates
-
JOSHI, A., KING, S. T., DUNLAP, G. W., AND CHEN, P. M. Detecting past and present intrusions through vulnerability-specific predicates. In SOSP'05: Proc. 20th ACM Symposium on Operating Systems Principles (2005), pp. 91-104.
-
SOSP'05: Proc. 20th ACM Symposium on Operating Systems Principles (2005)
, pp. 91-104
-
-
Joshi, A.1
King, S.T.2
Dunlap, G.W.3
Chen, P.M.4
-
17
-
-
85084162336
-
Secure execution via program shepherding
-
KIRIANSKY, V., BRUENING, D., AND AMARASINGHE, S. P. Secure execution via program shepherding. In Proc. 11th USENIX Security Symposium (2002), pp. 191-206.
-
Proc. 11th USENIX Security Symposium (2002)
, pp. 191-206
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.P.3
-
20
-
-
35048866415
-
RPS: An extension of reference monitor to prevent race-attacks
-
PARK, J., LEE, G., LEE, S., AND KIM, D.-K. RPS: An extension of reference monitor to prevent race-attacks. In PCM'04: 5th Pacific Rim Conf. on Multimedia (2004), pp. 556-563.
-
PCM'04: 5th Pacific Rim Conf. on Multimedia (2004)
, pp. 556-563
-
-
Park, J.1
Lee, G.2
Lee, S.3
Kim, D.-K.4
-
23
-
-
33846287594
-
Model checking an entire Linux distribution for security violations
-
SCHWARZ, B., CHEN, H., WAGNER, D., LIN, J., TU, W., MORRISON, G., AND WEST, J. Model checking an entire Linux distribution for security violations. In Proc 21st Computer Security Applications Conference (2005), pp. 13-22.
-
Proc 21st Computer Security Applications Conference (2005)
, pp. 13-22
-
-
Schwarz, B.1
Chen, H.2
Wagner, D.3
Lin, J.4
Tu, W.5
Morrison, G.6
West, J.7
-
26
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
S. De Capitani di Vimercati and P. Syverson, Eds., ACM Press
-
SHACHAM, H. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In CCS'07: Proc. 14th ACM conf. Computer and Communications Security (Oct. 2007), S. De Capitani di Vimercati and P. Syverson, Eds., ACM Press, pp. 552-61.
-
CCS'07: Proc. 14th ACM Conf. Computer and Communications Security (Oct. 2007)
, pp. 552-561
-
-
Shacham, H.1
-
27
-
-
85077321280
-
Enabling transactional file access via lightweight kernel extensions
-
SPILLANE, R. P., GAIKWAD, S., CHINNI, M., ZADOK, E., AND WRIGHT, C. P. Enabling transactional file access via lightweight kernel extensions. In FAST'09: Proc. 7th conf. on File and storage technologies (2009), pp. 29-42.
-
FAST'09: Proc. 7th Conf. on File and Storage Technologies (2009)
, pp. 29-42
-
-
Spillane, R.P.1
Gaikwad, S.2
Chinni, M.3
Zadok, E.4
Wright, C.P.5
-
28
-
-
14844303382
-
Detection of file-based race conditions
-
SUK LHEE, K., AND CHAPIN, S. J. Detection of file-based race conditions. Int'l Journal Information Security 4, 1-2 (2005), 105-119.
-
(2005)
Int'l Journal Information Security
, vol.4
, Issue.1-2
, pp. 105-119
-
-
Suk Lhee, K.1
Chapin, S.J.2
-
29
-
-
84872232423
-
Portably solving file TOCTTOU races with hardness amplification
-
TSAFRIR, D., HERTZ, T., WAGNER, D., AND DA SILVA, D. Portably solving file TOCTTOU races with hardness amplification. In FAST'08: Proc. 6th USENIX Conf. on File and Storage Technologies (2008), pp. 13:1-13:18.
-
FAST'08: Proc. 6th USENIX Conf. on File and Storage Technologies (2008)
-
-
Tsafrir, D.1
Hertz, T.2
Wagner, D.3
Da Silva, D.4
-
30
-
-
59449090267
-
-
Tech. Rep. RC24572, IBM T. J. Watson Research Center, June
-
TSAFRIR, D., HERTZ, T., WAGNER, D., AND DA SILVA, D. Portably preventing file race attacks with user-mode path resolution. Tech. Rep. RC24572, IBM T. J. Watson Research Center, June 2008.
-
(2008)
Portably Preventing File Race Attacks with User-mode Path Resolution
-
-
Tsafrir, D.1
Hertz, T.2
Wagner, D.3
Da Silva, D.4
-
32
-
-
33644499445
-
Preventing race condition attacks on file-systems
-
UPPULURI, P., JOSHI, U., AND RAY, A. Preventing race condition attacks on file-systems. In SAC'05: Proc. ACM Symposium on Applied computing (2005), SAC '05, pp. 346-353.
-
SAC'05: Proc. ACM Symposium on Applied Computing (2005), SAC '05
, pp. 346-353
-
-
Uppuluri, P.1
Joshi, U.2
Ray, A.3
-
33
-
-
84949505015
-
ITS4: A static vulnerability scanner for C and C++ code
-
VIEGA, J., BLOCH, J., KOHNO, T., AND MCGRAW, G. ITS4: a static vulnerability scanner for C and C++ code. In ACSAC'00: Ann. Comput. Security Applications Conf. (2000).
-
ACSAC'00: Ann. Comput. Security Applications Conf. (2000)
-
-
Viega, J.1
Bloch, J.2
Kohno, T.3
McGraw, G.4
-
37
-
-
34250377546
-
Extending ACID semantics to the file system
-
June
-
WRIGHT, C. P., SPILLANE, R., SIVATHANU, G., AND ZADOK, E. Extending ACID semantics to the file system. Trans. Storage 3 (June 2007).
-
(2007)
Trans. Storage
, vol.3
-
-
Wright, C.P.1
Spillane, R.2
Sivathanu, G.3
Zadok, E.4
|