USENIX Association Proceedings of the

@inproceedings{Chen2002USENIXAP,
  title={USENIX Association Proceedings of the},
  author={Hao Chen and David Wagner and Drew Dean},
  year={2002}
}
Access control in Unix systems is mainly based on user IDs, yet the system calls that modify user IDs ( uid-setting system calls ), such assetuid, are poorly designed, insufficiently documented, and widely misunderstood and misused. This has caused many security vulnerabilities in application programs. We propose to make progress on the setuid mystery… CONTINUE READING