April 2, 2024, 7:11 p.m. | Niels Dossche, Bert Abrath, Bart Coppens

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.00350v1 Announce Type: cross
Abstract: Race conditions are a class of bugs in software where concurrent accesses to shared resources are not protected from each other. Consequences of race conditions include privilege escalation, denial of service, and memory corruption which can potentially lead to arbitrary code execution. However, in large code bases the exact rules as to which fields should be accessed under which locks are not always clear. We propose a novel static technique that infers rules for how …

analysis arbitrary code arbitrary code execution arxiv bugs can class code code execution conditions consequences context corruption cs.cr cs.se denial of service escalation find kernel large memory memory corruption privilege privilege escalation race race conditions resources sensitive service software static analysis

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Threat Analysis Engineer

@ Gen | IND - Tamil Nadu, Chennai

Head of Security

@ Hippocratic AI | Palo Alto

IT Security Vulnerability Management Specialist (15.10)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

Security Engineer - Netskope/Proofpoint

@ Sainsbury's | Coventry, West Midlands, United Kingdom

Journeyman Cybersecurity Analyst

@ ISYS Technologies | Kirtland AFB, NM, United States