Time-of-check to time-of-use: Difference between revisions

Content deleted Content added
m Remove comma
Osalbahr (talk | contribs)
m References: Added archive link
Line 122:
| isbn=978-0-7695-3633-0
| s2cid=6393789
|archive-url=https://web.archive.org/web/20210518212029/https://www3.cs.stonybrook.edu/~rob/papers/races2.pdf
|archive-date=2021-05-18
|url-status=dead
}}</ref> In both cases, the attacker manipulates the OS state to control scheduling of the victim.