Checking for Race Conditions in File Accesses
نویسندگان
چکیده
Flaws due to race conditions in which the binding of a name to an object changes between repeated references occur in many programs. We examine one type of this flaw in the UNIX operating system, and describe a semantic method for detecting possible instances of this problem. We present the results of one such analysis in which a previously undiscovered race condition flaw was found.
منابع مشابه
Dynamic Detection and Prevention of Race Conditions in File Accesses
Race conditions in filesystem accesses occur when sequences of filesystem operations are not carried out in an isolated manner. Incorrect assumptions of filesystem namespace access isolation allow attackers to elevate their privileges without authorization by changing the namespace bindings. To address this security issue, we propose a mechanism for keeping track of all filesystem operations an...
متن کاملRace Conditions, Files, and Security Flaws; or the Tortoise and the Hare Redux
A pernicious type of security problem, race conditions create a timing interval in which the manipulation of resources allows an attacker to gain privileges, read and alter protected files, and violate the security policy of the site. The majority of these conditions found on applications and system programs in the UNIX operating system arise during file system manipulation and file accesses. T...
متن کاملA New Lockset Algorithm and Its Applications
In this study we present a new dynamic lockset algorithm that detects race conditions from execution traces of concurrent programs. The algorithm checks if two accesses to a variable are ordered by a happens-before relation. We can handle interesting cases including object initialization, thread-locality, and dynamically changing locksets over time. Our algorithm is different from traditional a...
متن کاملExtending IMP to Support Threads with Race Detection by Model Checking
This project explored non-determinism introduced by threads in the context of an extremely simple language called IMP. IMP was extended to support multi-threaded execution, as well as basic locking with mutexes. A model checker was implemented to explore all possible execution states of a program written in this extended IMP language. While the model checker executes a number of checks are run ...
متن کاملVulnerability Analysis: An Extended Abstract
> Davis. His research areas include computer and network security, > especially analysis of vulnerabilities, building tools to detect > vulnerabilities, and ameliorating or eliminating them. >Subject Category: Vulnerabilities and Attacks > > >Extended Abstract: > >The goal of our work is to develop a methodology for detecting pre viously >unknown vulnerabilities in systems. > >We begin by argui...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computing Systems
دوره 2 شماره
صفحات -
تاریخ انتشار 1996