Dynamic Detection and Prevention of Race Conditions in File Accesses

نویسندگان

  • Eugene Tsyrklevich
  • Bennet Yee
چکیده

Race conditions in filesystem accesses occur when sequences of filesystem operations are not carried out in an isolated manner. Incorrect assumptions of filesystem namespace access isolation allow attackers to elevate their privileges without authorization by changing the namespace bindings. To address this security issue, we propose a mechanism for keeping track of all filesystem operations and possible interferences that might arise. If a filesystem operation is found to be interfering with another operation, it is temporarily suspended allowing the first process to access a file object to proceed, thereby reducing the size of the time window when a race condition exists. The above mechanism is shown to be effective at stopping all realistic filesystem race condition attacks known to us with minimal performance overhead.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vulnerability Analysis: An Extended Abstract

> Davis. His research areas include computer and network security, > especially analysis of vulnerabilities, building tools to detect > vulnerabilities, and ameliorating or eliminating them. >Subject Category: Vulnerabilities and Attacks > > >Extended Abstract: > >The goal of our work is to develop a methodology for detecting pre viously >unknown vulnerabilities in systems. > >We begin by argui...

متن کامل

Evaluation of Root Canal Transportation using Bio Race and K -Flexo file instruments: using cone-Bean Computed

Background & Aim: Deviation from the original shape of the canal leads to poor filling and lack of proper canal seal and consequently to the failure of root treatment The aim of this experimental study was to determine the extent of apical transportation after instrumentation with hand K-Flexofile and BioRace rotary instruments by cone-beam computed tomography (CBCT). Material and Methods: In t...

متن کامل

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

Race Conditions, Files, and Security Flaws; or the Tortoise and the Hare Redux

A pernicious type of security problem, race conditions create a timing interval in which the manipulation of resources allows an attacker to gain privileges, read and alter protected files, and violate the security policy of the site. The majority of these conditions found on applications and system programs in the UNIX operating system arise during file system manipulation and file accesses. T...

متن کامل

ShrinkWrap: E cient Dynamic Race Detection for Array-Intensive Programs

We explore a new technique for e cient dynamic race detection on programs using arrays intensively. Standard techniques lead to redundant operations and redundant representations in many common cases. For these common cases, we design dynamic compression methods that eliminate this redundancy. Finally, we implement our techniques in a prototype tool called ShrinkWrap, which is built as an exten...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003