Time-of-check to time-of-use: Difference between revisions

Content deleted Content added
References: Bishop & Dilger 1996
References: Fixing other two refs
Line 28:
== References ==
* Bishop, Matt; and Dilger, Michael; 1996; [http://nob.cs.ucdavis.edu/bishop/papers/1996-compsys/racecond.pdf ''Checking for race conditions in file accesses'']; Computing Systems, Vol. 9, No. 2, pp. 131–152
* Borisov, Nikita; Johnson, Rob; Sastry, Naveen; and Wagner, David; 2005; [http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=F70A03643D48FB5944F0FA3FA62D1D96?doi=10.1.1.117.7757&rep=rep1&type=pdf ''Fixing Races for Fun and Profit: How to abuse atime'']; Proceedings of the 14th Conference on USENIX Security Symposium (Security'05), Baltimore (MD), July 31–August 5, 2005, Vol. 14, pp. 303–314
* [http://www.usenix.org/events/sec05/tech/borisov.html Fixing Races for Fun and Profit: How to abuse atime]
* Tsafrir, Dan; Hertz, Tomer; Wagner, David; Da Silva, Dilma; 2008; [http://www.usenixcs.orgberkeley.edu/events~daw/fast08papers/tech/tsafrirtocttou-fast08.htmlpdf ''Portably Solving File TOCTTOU Races with Hardness Amplification''], Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST '08), San Jose (CA), February 26–29, 2008, pp. 189–206
 
[[Category:Security exploits]]