Content deleted Content added
404 fixed; URL updated; cite web completed |
m https everywhere! |
||
Line 115:
| title=Exploiting Unix File-System Races via Algorithmic Complexity Attacks
| work=Proceedings of the [[IEEE]] Symposium on Security and Privacy
| url=
| ___location=Berkeley, CA
| date=May 2009}}</ref> In both cases, the attacker manipulates the OS state to control scheduling of the victim.
Line 178:
| ___location=San Francisco, CA
| date=February 24–27, 2009
| url=
| last1=Porter
| first1=Donald E.
Line 194:
| ___location=Big Sky, MT
| date=October 11–14, 2009
| url=
| last1=Russinovich
| first1=Mark
Line 218:
| date=2002-05-12
| title=Setuid Demystified
| url=
==See also==
Line 229:
* {{cite web |last1=Bishop |first1=Matt |last2=Dilger |first2=Michael |year=1996 |title=Checking for Race Conditions in File Accesses |work=Computing Systems |volume=9 |number=2 |pages=131–152 |url=http://nob.cs.ucdavis.edu/bishop/papers/1996-compsys/racecond.pdf }}
* {{cite web |last1=Tsafrir |first1=Dan |last2=Hertz |first2=Tomer |last3=Wagner |first3=David |last4=Da Silva |first4=Dilma |year=2008 |title=Portably Solving File TOCTTOU Races with Hardness Amplification |work=Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST '08), San Jose (CA), February 26–29, 2008 |pages=189–206 |url=
[[Category:Computer security exploits]]
|