Articles with "toctou vulnerabilities" as a keyword



Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3153064

Abstract: File-based Time-of-Check to Time-of-Use (TOCTOU) race conditions are a well-known type of security vulnerability. A wide variety of techniques have been proposed to detect, mitigate, avoid, and exploit these vulnerabilities over the past 35 years.… read more here.

Keywords: file based; attack techniques; toctou vulnerabilities; defense attack ... See more keywords