Time of check to time of use

Results: 31



#Item
1Exploiting Concurrency Vulnerabilities in System Call Wrappers Robert N. M. Watson Security Research Group Computer Laboratory

Exploiting Concurrency Vulnerabilities in System Call Wrappers Robert N. M. Watson Security Research Group Computer Laboratory

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2007-08-06 09:53:24
2DynaRace Protecting Applications Against TOCTTOU Races by User-Space Caching of File Metadata Mathias Payer & Thomas R. Gross Department of Computer Science

DynaRace Protecting Applications Against TOCTTOU Races by User-Space Caching of File Metadata Mathias Payer & Thomas R. Gross Department of Computer Science

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
3Protecting Applications Against TOCTTOU Races by User-Space Caching of File Metadata Mathias Payer Thomas R. Gross

Protecting Applications Against TOCTTOU Races by User-Space Caching of File Metadata Mathias Payer Thomas R. Gross

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
4Fixing Races for Fun and Profit: How to abuse atime Nikita Borisov Rob Johnson Naveen Sastry David Wagner

Fixing Races for Fun and Profit: How to abuse atime Nikita Borisov Rob Johnson Naveen Sastry David Wagner

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:51
5View access control as a matrix  Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
6Checking for Race Conditions in File Accesses Matt Bishop, Michael Dilger Department of Computer Science University of California at Davis Davis, CAAbstract

Checking for Race Conditions in File Accesses Matt Bishop, Michael Dilger Department of Computer Science University of California at Davis Davis, CAAbstract

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
7CS140 Operating Systems Final – December 12, 2007 OPEN BOOK, OPEN NOTES  Your name:

CS140 Operating Systems Final – December 12, 2007 OPEN BOOK, OPEN NOTES Your name:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:12
8Concurrency Attacks Junfeng Yang, Ang Cui, Sal Stolfo, Simha Sethumadhavan {junfeng, ang, sal, simha}cs.columbia.edu Department of Computer Science Columbia University

Concurrency Attacks Junfeng Yang, Ang Cui, Sal Stolfo, Simha Sethumadhavan {junfeng, ang, sal, simha}cs.columbia.edu Department of Computer Science Columbia University

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:35
9The Case for Analysis Preserving Language Transformation Xiaolan Zhang Larry Koved

The Case for Analysis Preserving Language Transformation Xiaolan Zhang Larry Koved

Add to Reading List

Source URL: gmarceau.qc.ca

Language: English - Date: 2008-03-12 13:58:09
10CHECK YOUR KNOWLEDGE OF AGRICULTURE IN VIRGINIA March 15 – 21, 2015 is Virginia Agriculture Week and Virginia Agriculture Literacy Week, a perfect time to check your knowledge about Virginia agriculture. 1. Where does

CHECK YOUR KNOWLEDGE OF AGRICULTURE IN VIRGINIA March 15 – 21, 2015 is Virginia Agriculture Week and Virginia Agriculture Literacy Week, a perfect time to check your knowledge about Virginia agriculture. 1. Where does

Add to Reading List

Source URL: www.vdacs.virginia.gov

Language: English - Date: 2015-03-05 13:49:19