Cited By
View all- Basu ASampson JQian ZJaeger TNaor DGoel A(2023)Unsafe at any copyProceedings of the 21st USENIX Conference on File and Storage Technologies10.5555/3585938.3585950(183-197)Online publication date: 21-Feb-2023
- Raducu RRodriguez RAlvarez P(2022)Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic ReviewIEEE Access10.1109/ACCESS.2022.315306410(21742-21758)Online publication date: 2022
- Schwarz MGruss DLipp MMaurice CSchuster TFogh AMangard SKim JAhn GKim SKim YLopez JKim T(2018)Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU FeaturesProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196508(587-600)Online publication date: 29-May-2018
- Show More Cited By