all InfoSec news
A Context-Sensitive, Outlier-Based Static Analysis to Find Kernel Race Conditions
April 2, 2024, 7:11 p.m. | Niels Dossche, Bert Abrath, Bart Coppens
cs.CR updates on arXiv.org arxiv.org
Abstract: Race conditions are a class of bugs in software where concurrent accesses to shared resources are not protected from each other. Consequences of race conditions include privilege escalation, denial of service, and memory corruption which can potentially lead to arbitrary code execution. However, in large code bases the exact rules as to which fields should be accessed under which locks are not always clear. We propose a novel static technique that infers rules for how …
analysis arbitrary code arbitrary code execution arxiv bugs can class code code execution conditions consequences context corruption cs.cr cs.se denial of service escalation find kernel large memory memory corruption privilege privilege escalation race race conditions resources sensitive service software static analysis
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Threat Analysis Engineer
@ Gen | IND - Tamil Nadu, Chennai
Head of Security
@ Hippocratic AI | Palo Alto
IT Security Vulnerability Management Specialist (15.10)
@ OCT Consulting, LLC | Washington, District of Columbia, United States
Security Engineer - Netskope/Proofpoint
@ Sainsbury's | Coventry, West Midlands, United Kingdom
Journeyman Cybersecurity Analyst
@ ISYS Technologies | Kirtland AFB, NM, United States