Dynamic Detection and Prevention of Race Conditions in File Accesses
نویسندگان
چکیده
Race conditions in filesystem accesses occur when sequences of filesystem operations are not carried out in an isolated manner. Incorrect assumptions of filesystem namespace access isolation allow attackers to elevate their privileges without authorization by changing the namespace bindings. To address this security issue, we propose a mechanism for keeping track of all filesystem operations and possible interferences that might arise. If a filesystem operation is found to be interfering with another operation, it is temporarily suspended allowing the first process to access a file object to proceed, thereby reducing the size of the time window when a race condition exists. The above mechanism is shown to be effective at stopping all realistic filesystem race condition attacks known to us with minimal performance overhead.
منابع مشابه
Vulnerability Analysis: An Extended Abstract
> Davis. His research areas include computer and network security, > especially analysis of vulnerabilities, building tools to detect > vulnerabilities, and ameliorating or eliminating them. >Subject Category: Vulnerabilities and Attacks > > >Extended Abstract: > >The goal of our work is to develop a methodology for detecting pre viously >unknown vulnerabilities in systems. > >We begin by argui...
متن کاملEvaluation of Root Canal Transportation using Bio Race and K -Flexo file instruments: using cone-Bean Computed
Background & Aim: Deviation from the original shape of the canal leads to poor filling and lack of proper canal seal and consequently to the failure of root treatment The aim of this experimental study was to determine the extent of apical transportation after instrumentation with hand K-Flexofile and BioRace rotary instruments by cone-beam computed tomography (CBCT). Material and Methods: In t...
متن کاملDyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملRace Conditions, Files, and Security Flaws; or the Tortoise and the Hare Redux
A pernicious type of security problem, race conditions create a timing interval in which the manipulation of resources allows an attacker to gain privileges, read and alter protected files, and violate the security policy of the site. The majority of these conditions found on applications and system programs in the UNIX operating system arise during file system manipulation and file accesses. T...
متن کاملShrinkWrap: E cient Dynamic Race Detection for Array-Intensive Programs
We explore a new technique for e cient dynamic race detection on programs using arrays intensively. Standard techniques lead to redundant operations and redundant representations in many common cases. For these common cases, we design dynamic compression methods that eliminate this redundancy. Finally, we implement our techniques in a prototype tool called ShrinkWrap, which is built as an exten...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003