메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Exploiting concurrency vulnerabilities in system call wrappers

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY MODEL; SYSTEM CALL INTERPOSITION; SYSTEM CALLS; THEORY AND PRACTICE;

EID: 85084162296     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (68)

References (25)
  • 1
    • 85077788181 scopus 로고    scopus 로고
    • Apple Computer, Inc
    • Kernel Authorization. Technical Note TN2127, Apple Computer, Inc., 2007. http://developer.apple.com/technotes/ tn2005/tn2127.html.
    • (2007) Technical Note TN2127
  • 4
    • 0004200684 scopus 로고
    • Technical report, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA 01730, October
    • James P. Anderson. Computer Security Technology Planning Study. Technical report, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA 01730, October 1972.
    • (1972) Computer Security Technology Planning Study
    • Anderson, J.P.1
  • 5
    • 84976735452 scopus 로고
    • Technical Report ISI/SR-78-13, Information Sciences Institute, University of Southern California, May
    • Richard Bisbey and Dennis Hollingworth. Protection Analysis: Final Report. Technical Report ISI/SR-78-13, Information Sciences Institute, University of Southern California, May 1978.
    • (1978) Protection Analysis: Final Report
    • Bisbey, R.1    Hollingworth, D.2
  • 6
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • Spring
    • Matt Bishop and Michael Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2):131–152, Spring 1996.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 8
    • 85084164657 scopus 로고    scopus 로고
    • Fixing races for fun and profit: How to use access(2)
    • August
    • Drew Dean and Alan J. Hu. Fixing Races for Fun and Profit: How to use access(2). In Proc. 13th USENIX Security Symposium, August 2004.
    • (2004) Proc. 13th USENIX Security Symposium
    • Dean, D.1    Hu, A.J.2
  • 9
    • 85077797680 scopus 로고    scopus 로고
    • Kauth: Kernel authorization framework
    • January
    • Elad Efrat. kauth: kernel authorization framework. In NetBSD Kernel Developer’s Manual. January 2007. http://www.netbsd.org/ ~elad/recent/man/kauth.9.html.
    • (2007) NetBSD Kernel Developer’s Manual
    • Efrat, E.1
  • 10
    • 85077791485 scopus 로고    scopus 로고
    • Follow the rules regarding concurrency management
    • October
    • William L. Fithen. Follow the Rules Regarding Concurrency Management. BuildSecurityIn, October 2005. https://buildsecurityin.us-cert.gov/daisy/bsi/articles/ knowledge/guidelines/332.html.
    • (2005) BuildSecurityIn
    • Fithen, W.L.1
  • 13
  • 14
    • 2642570168 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in in system call interposition based security tools
    • February
    • Tal Garfinkel. Traps and Pitfalls: Practical Problems in in System Call Interposition Based Security Tools. In Proc. Network and Distributed Systems Security Symposium, February 2003.
    • (2003) Proc. Network and Distributed Systems Security Symposium
    • Garfinkel, T.1
  • 19
    • 85077798819 scopus 로고    scopus 로고
    • Todd C. Miller. Sudo, 2007. http://www.gratisoft.us/sudo/.
    • (2007) Sudo
    • Miller, T.C.1
  • 20
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • Washington, DC, August
    • Niels Provos. Improving Host Security with System Call Policies. In Proc. 12th USENIX Security Symposium, Washington, DC, August 2003.
    • (2003) Proc. 12th USENIX Security Symposium
    • Provos, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.