Dynamic detection and prevention of race conditions in file accesses

被引:0
|
作者
Tsyrklevich, E [1 ]
Yee, B [1 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Race conditions in filesystem accesses occur when sequences of filesystem operations are not carried out in an isolated manner. Incorrect assumptions of filesystem namespace access isolation allow attackers to elevate their privileges without authorization by changing the namespace bindings. To address this security issue, we propose a mechanism for keeping track of all filesystem operations and possible interferences that might arise. If a filesystem operation is found to be interfering with another operation, it is temporarily suspended allowing the first process to access a file object to proceed, thereby reducing the size of the time window when a race condition exists. The above mechanism is shown to be effective at stopping all realistic filesystem race condition attacks known to us with minimal performance overhead.
引用
收藏
页码:243 / 255
页数:13
相关论文
共 50 条
  • [1] Checking for race conditions in file accesses
    Bishop, M
    Dilger, M
    [J]. COMPUTING SYSTEMS, 1996, 9 (02): : 131 - 152
  • [2] Detection of file-based race conditions
    Lhee K.-S.
    Chapin S.J.
    [J]. International Journal of Information Security, 2005, 4 (1-2) : 105 - 119
  • [3] Anomaly detection in computer security and an application to file system accesses
    Stolfo, SJ
    Hershkop, S
    Bui, LH
    Ferster, R
    Wang, K
    [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, 3488 : 14 - 28
  • [4] Building Robust Temporal User Profiles for Anomaly Detection in File System Accesses
    Mehnaz, Shagufta
    Bertino, Elisa
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [5] Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses
    Mehnaz, Shagufta
    Bertino, Elisa
    [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 3 - 14
  • [6] ESTIMATING ACCESSES IN PARTITIONED SIGNATURE FILE ORGANIZATIONS
    CIACCIA, P
    ZEZULA, P
    [J]. ACM TRANSACTIONS ON INFORMATION SYSTEMS, 1993, 11 (02) : 133 - 142
  • [7] Hiding data accesses in steganographic file system
    Zhou, X
    Pang, HH
    Tan, KL
    [J]. 20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, : 572 - 583
  • [8] Mitigating data fragmentation for small file accesses
    Ahn, WH
    Park, D
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (06): : 1126 - 1133
  • [9] A Sound Framework for Dynamic Prevention of Local File Inclusion
    Tajbakhsh, Mir Saman
    Bagherzadeh, Lamshid
    [J]. 2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2015,
  • [10] AN OPTIMISTIC ALGORITHM FOR CONCURRENT ACCESSES TO A SINGLE REPLICATED FILE
    JIA, XH
    ZHANG, YC
    [J]. IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 12 : 365 - 371