usenix conference policies
Fixing Races for Fun and Profit: How to Abuse atime
Abstract:
Dean and Hu proposed a probabilistic countermeasure to the classic access(2)/open(2) TOCTTOU race condition in privileged Unix programs [4]. In this paper, we describe an attack that succeeds with very high probability against their countermeasure. We then consider a stronger randomized variant of their defense and show that it, too, is broken. We conclude that access(2) must never be used in privileged Unix programs. The tools we develop can be used to attack other filesystem races, underscoring the importance of avoiding such races in secure software.
BibTeX
@inproceedings {269236,
author = {Nikita Borisov and Rob Johnson},
title = {Fixing Races for Fun and Profit: How to Abuse atime},
booktitle = {14th USENIX Security Symposium (USENIX Security 05)},
year = {2005},
address = {Baltimore, MD},
url = {https://www.usenix.org/conference/14th-usenix-security-symposium/fixing-races-fun-and-profit-how-abuse-atime},
publisher = {USENIX Association},
month = jul
}
author = {Nikita Borisov and Rob Johnson},
title = {Fixing Races for Fun and Profit: How to Abuse atime},
booktitle = {14th USENIX Security Symposium (USENIX Security 05)},
year = {2005},
address = {Baltimore, MD},
url = {https://www.usenix.org/conference/14th-usenix-security-symposium/fixing-races-fun-and-profit-how-abuse-atime},
publisher = {USENIX Association},
month = jul
}
connect with us