Login / Signup
Exploiting Unix File-System Races via Algorithmic Complexity Attacks.
Xiang Cai
Yuwei Gui
Rob Johnson
Published in:
IEEE Symposium on Security and Privacy (2009)
Keyphrases
</>
file system
unauthorized access
access patterns
countermeasures
data transfer
flash memory
application specific
multi tiered
storage systems
operating system
storage devices
search tools
metadata management
continuous media
user friendly
windows nt
database
document repository
naming conventions