Locating File Processing Vulnerabilities

نویسنده

  • Nuno Ferreira Neves
چکیده

An application is vulnerable to attacks if it exhibits incorrect behavior while it reads and processes the contents of a specially crafted malicious file. These vulnerabilities are often caused due to programming bugs in the routines that parse and utilize the fields of a file. In this paper, we propose a solution for the discovery of this kind of vulnerabilities, using an approach that is based on attack injection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of routing attacks in peer to peer overlay networks

Peer-to-peer (P2P) systems are distributed systems in which nodes act as peers, such systems are becoming very popular in applications like file sharing. In this kind of architecture, security in each transaction is fundamental requirements. The aim of a Distributed hash tables provides the method for locating resources (generally files) within a P2P network. In this paper our target is to anal...

متن کامل

A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications

Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, security analysts should thus consider the impact that file-system operations have on the security of the whole application. Moreover, the analysis should take into consideration how file-system vulnerabilities might interact with other vulnerabilities leading an attack...

متن کامل

Performance Improvement of Hint-Based Locating & Routing Mechanism in P2P File-Sharing Systems

Hint-based Locating & Routing Mechanism (HBLR) derives from the locating & routing mechanism in Freenet. HBLR uses file location hint to enhance the performance of file searching and downloading. In comparison with its ancestor, HBLR saves storage space and reduces file request latency. However, because of the inherent fallibility of hint, employing location hint naively for file locating in P2...

متن کامل

A Hint-based Locating & Routing Mechanism in Peer-to-Peer File Sharing Systems1

A hint-based file locating & routing mechanism was proposed to improve the performance of peer-to-peer file sharing systems. The framework was based on the Freenet document routing model with file location hints to enhance the performance of file searching and downloading. Experiment shows that the proposed mechanism improves the system performance by saving disk space, as well as reduces file ...

متن کامل

RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities

Temporary file race vulnerabilities occur when privileged programs attempt to create temporary files in an unsafe manner. “Unsafe” means “non-atomic with respect to an attacker’s activities.” There is no portable standard for safely (atomically) creating temporary files, and many operating systems have no safe temporary file creation at all. As a result, many programs continue to use unsafe mea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006