A Tour of TOCTTOUs

Time of check to time of use (TOCTTOU) vulnerabilities exist due to race conditions arising from an invalid assumption: That nothing affecting the validity of a security assertion changes between the time it is checked and the time an operation that depends on that assertion is performed. In fact...
Craig Lowery
May 23, 2003

All papers are copyrighted. No re-posting of papers is permitted