Dynamic detection and prevention of race conditions in file accesses (2003)

by Eugene Tsyrklevich , Bennet Yee
Venue:In Proceedings of the 12th USENIX Security Symposium
Citations:21 - 0 self

Documents Related by Co-Citation

135 Checking for Race Conditions in File Accesses – Matt Bishop, Michael Dilger - 1996
20 Fixing Races for Fun and Profit: How to use access(2) – Drew Dean, Alan J. Hu - 2004
21 RaceGuard: Kernel Protection from Temporary File Race Vulnerabilities – Crispin Cowan, Steve Beattie, Chris Wright, Greg Kroah-hartman - 2001
22 Noninterference and intrusion detection – C KO, T REDMOND
13 Tocttou vulnerabilities in unix-style file systems: an anatomical study – Wei - 2005
9 Preventing race condition attacks on file-systems – P UPPULURI, U JOSHI, A RAY
11 Detection of file-based race conditions – K suk Lhee, S J Chapin - 2005
17 Fixing races for fun and profit: how to abuse atime – Nikita Borisov, Rob Johnson, Naveen Sastry, David Wagner - 2005
116 Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring – Calvin Ko, George Fink, Karl Levitt - 1994
240 RacerX: Effective, Static Detection of Race Conditions and Deadlocks – Dawson Engler, Ken Ashcraft - 2003
25 Model Checking an Entire Linux Distribution for Security Violations – Benjamin Schwarz, Hao Chen, David Wagner, Geoff Morrison, Jacob West, Jeremy Lin - 2005
52 Experience with Transactions in QuickSilver – Prank Schmuck, Jim Wyllie - 1991
11 Portably solving file TOCTTOU races with hardness amplification – Dan Tsafrir, Tomer Hertz, David Wagner, Dilma Da Silva - 2008
196 MOPS: an Infrastructure for Examining Security Properties of Software – Hao Chen, David Wagner - 2002
339 Checking system rules using system-specific, programmer-written compiler extensions – Dawson Engler, Benjamin Chelf, Andy Chou - 2000
15 Operating system integrity in OS/VS2 – W S McPhee - 1974
31 Secure Applications Need Flexible Operating Systems – David Mazieres, M. Frans Kaashoek - 1997
8 A Methodical Defense against TOCTTOU Attacks: The EDGI Approach – C Pu, J Wei - 2006
6 Monitoring the security health of software systems – A AGGARWAL, P JALOTE - 2006