2011 Seventh European Conference on Computer Network Defense 2011
DOI: 10.1109/ec2nd.2011.17
|View full text |Cite
|
Sign up to set email alerts
|

A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…This is difficult to determine statically. The STING system [50] provides passive runtime monitoring of processes for use of bindings that could be used to perform file squatting and link traversal attacks using DAC policies, so such a runtime monitoring approach could be extended to utilize attack operations generated by POLYSCOPE. Second, once we know when a victim may be threatened by an attack operation, we need to generate test cases that could exploit the victim.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…This is difficult to determine statically. The STING system [50] provides passive runtime monitoring of processes for use of bindings that could be used to perform file squatting and link traversal attacks using DAC policies, so such a runtime monitoring approach could be extended to utilize attack operations generated by POLYSCOPE. Second, once we know when a victim may be threatened by an attack operation, we need to generate test cases that could exploit the victim.…”
Section: Discussionmentioning
confidence: 99%
“…Current fuzzing techniques [20] do not target these types of attack operations. Runtime monitoring techniques [50,47] and similar techniques for assessing use of Android intents [1] generate simple test cases, enabling detection of unprotected cases. We aim to generate test cases that account for the conditional checks in the program fully.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Vijayakumar et al [55] introduced a software prototype that stops attacks targeting vulnerabilities based on name resolution (such as TOCTOU) by combining four incomplete defense techniques (specifically, system resource restrictions, capabilities, namespace management, and program resource restrictions) to build a complete solution. It is implemented as a SELinux module in version 2.6.35 of the Linux kernel.…”
Section: Based On Dynamic Kernel-space Detectionmentioning
confidence: 99%