Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review | IEEE Journals & Magazine | IEEE Xplore

Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review


We present a systematic literature review on defense and attack techniques related to the file-based TOCTOU vulnerability. The results of this review are finally used to ...

Abstract:

File-based Time-of-Check to Time-of-Use (TOCTOU) race conditions are a well-known type of security vulnerability. A wide variety of techniques have been proposed to detec...Show More

Abstract:

File-based Time-of-Check to Time-of-Use (TOCTOU) race conditions are a well-known type of security vulnerability. A wide variety of techniques have been proposed to detect, mitigate, avoid, and exploit these vulnerabilities over the past 35 years. However, despite these research efforts, TOCTOU vulnerabilities remain unsolved due to their non-deterministic nature and the particularities of the different filesystems involved in running vulnerable programs, especially in Unix-like operating system environments. In this paper, we present a systematic literature review on defense and attack techniques related to the file-based TOCTOU vulnerability. We apply a reproducible methodology to search, filter, and analyze the most relevant research proposals to define a global and understandable vision of existing solutions. The results of this analysis are finally used to discuss future research directions that can be explored to move towards a universal solution to this type of vulnerability.
We present a systematic literature review on defense and attack techniques related to the file-based TOCTOU vulnerability. The results of this review are finally used to ...
Published in: IEEE Access ( Volume: 10)
Page(s): 21742 - 21758
Date of Publication: 21 February 2022
Electronic ISSN: 2169-3536

Funding Agency:


References

References is not available for this document.