RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities
نویسندگان
چکیده
Temporary file race vulnerabilities occur when privileged programs attempt to create temporary files in an unsafe manner. “Unsafe” means “non-atomic with respect to an attacker’s activities.” There is no portable standard for safely (atomically) creating temporary files, and many operating systems have no safe temporary file creation at all. As a result, many programs continue to use unsafe means to create temporary files, resulting in widespread vulnerabilities. This paper presents RaceGuard: a kernel enhancement that detects attempts to exploit temporary file race vulnerabilities, and does so with sufficient speed and precision that the attack can be halted before it takes effect. RaceGuard has been implemented, tested, and measured. We show that RaceGuard is effective at stopping temporary file race attacks, preserves compatibility (no legitimate software is broken), and preserves performance (overhead is minimal).
منابع مشابه
Evaluation of Root Canal Transportation using Bio Race and K -Flexo file instruments: using cone-Bean Computed
Background & Aim: Deviation from the original shape of the canal leads to poor filling and lack of proper canal seal and consequently to the failure of root treatment The aim of this experimental study was to determine the extent of apical transportation after instrumentation with hand K-Flexofile and BioRace rotary instruments by cone-beam computed tomography (CBCT). Material and Methods: In t...
متن کاملMaking Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user-not just the system administrator-to allocate Unix user IDs, to use chroot, and to set up firewall rules in order to confine untrusted code. One key idea in UserFS is representing user IDs as files in a /proc-like file system, thus allowing applications to manage user IDs like any other files, by setting permi...
متن کاملVulnerability Analysis: An Extended Abstract
> Davis. His research areas include computer and network security, > especially analysis of vulnerabilities, building tools to detect > vulnerabilities, and ameliorating or eliminating them. >Subject Category: Vulnerabilities and Attacks > > >Extended Abstract: > >The goal of our work is to develop a methodology for detecting pre viously >unknown vulnerabilities in systems. > >We begin by argui...
متن کاملModeling and preventing TOCTTOU vulnerabilities in Unix-style file systems
TOCTTOU (Time-of-Check-To-Time-Of-Use) is a file-based race condition in Unix-style systems and characterized by a pair of file object access by a vulnerable program: a check operation establishes certain condition about the file object (e.g., the file exists), followed by a use operation that assumes that the established condition still holds. Due to the lack of support for transactions in Uni...
متن کاملOperating System Support for Easy Development of Distributed File Systems
A number of new distributed file systems have been developed, but the development of such file systems is not a simple task because it requires the operating system kernel to be modified. We have therefore developed the CAPELA operating system, which makes distributed file systems easy to develop. CAPELA allows the users to develop a file system as an extension module separated from the kernel,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001