Content deleted Content added
→References: Bishop & Dilger 1996 |
→References: Fixing other two refs |
||
Line 28:
== References ==
* Bishop, Matt; and Dilger, Michael; 1996; [http://nob.cs.ucdavis.edu/bishop/papers/1996-compsys/racecond.pdf ''Checking for race conditions in file accesses'']; Computing Systems, Vol. 9, No. 2, pp. 131–152
* Borisov, Nikita; Johnson, Rob; Sastry, Naveen; and Wagner, David; 2005; [http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=F70A03643D48FB5944F0FA3FA62D1D96?doi=10.1.1.117.7757&rep=rep1&type=pdf ''Fixing Races for Fun and Profit: How to abuse atime'']; Proceedings of the 14th Conference on USENIX Security Symposium (Security'05), Baltimore (MD), July 31–August 5, 2005, Vol. 14, pp. 303–314
* Tsafrir, Dan; Hertz, Tomer; Wagner, David; Da Silva, Dilma; 2008; [http://www.
[[Category:Security exploits]]
|