Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review.
Razvan RaducuRicardo J. RodríguezPedro ÁlvarezPublished in: IEEE Access (2022)
Keyphrases
- systematic review
- attack graphs
- attack graph
- security vulnerabilities
- countermeasures
- defense mechanisms
- network security
- intrusion detection
- security risks
- denial of service
- empirical studies
- dos attacks
- ddos attacks
- information security
- attack scenarios
- data corruption
- buffer overflow
- database
- file system
- power analysis
- computer viruses
- alert correlation
- attack detection
- denial of service attacks
- intrusion detection system
- advanced research projects agency
- data mining
- key exchange protocol
- computer virus
- file formats
- network configuration
- file organization
- anomaly detection
- file organizations
- file structure
- computer security
- network traffic
- computer systems
- web services