usenix conference policies
TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study
Error message
You are not authorized to post comments.To Time of Use (TOCTTOU) vulnerabilities in Unix-style file systems (e.g., Linux) are difficult to find and prevent. We describe a comprehensive model of TOCTTOU vulnerabilities, enumerating 224 file system call pairs that may lead to successful TOCTTOU attacks. Based on this model, we built kernel monitoring tools that confirmed known vulnerabilities and discovered new ones (in often-used system utilities such as rpm, vi, and emacs). We evaluated the probability of successfully exploiting these newly discovered vulnerabilities and analyzed in detail the system events during such attacks. Our performance evaluation shows that the dynamic monitoring of system calls introduces non-negligible overhead in microbenchmark of those file system calls, but their impact on application benchmarks such as Andrew and PostMark is only a few percent.
author = {Jinpeng Wei and Calton Pu},
title = {{TOCTTOU} Vulnerabilities in {UNIX-Style} File Systems: An Anatomical Study},
booktitle = {4th USENIX Conference on File and Storage Technologies (FAST 05)},
year = {2005},
address = {San Francisco, CA},
url = {https://www.usenix.org/conference/fast-05/tocttou-vulnerabilities-unix-style-file-systems-anatomical-study},
publisher = {USENIX Association},
month = dec
}
connect with us