usenix conference policies
RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities
Temporary file race vulnerabilities occur when privi-leged programs attempt to create temporary files in an unsafe manner. "Unsafe" means "non-atomic with respect to an attacker's activities." There is no portable standard for safely (atomically) creating temporary files, and many operating systems have no safe temporary file creation at all. As a result, many programs continue to use unsafe means to create temporary files, resulting in widespread vulnerabilities. This paper presents Race-Guard: a kernel enhancement that detects attempts to exploit temporary file race vulnerabilities, and does so with sufficient speed and precision that the attack can be halted before it takes effect. RaceGuard has been imple-mented, tested, and measured. We show that RaceGuard is effective at stopping temporary file race attacks, pre-serves compatibility (no legitimate software is broken), and preserves performance (overhead is minimal).
author = {Crispin Cowan and Steve Beattie and Chris Wright and Greg Kroah-Hartman},
title = {{RaceGuard}: Kernel Protection From Temporary File Race Vulnerabilities},
booktitle = {10th USENIX Security Symposium (USENIX Security 01)},
year = {2001},
address = {Washington, D.C.},
url = {https://www.usenix.org/conference/10th-usenix-security-symposium/raceguard-kernel-protection-temporary-file-race},
publisher = {USENIX Association},
month = aug
}
connect with us