Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,759 papers from all fields of science
Search
Sign In
Create Free Account
Time of check to time of use
Known as:
TOCTOU
, TOCTTOU
, Time-of-check-to-time-of-use
In software development, time of check to time of use (TOCTTOU or TOCTOU, pronounced "TOCK too") is a class of software bug caused by changes in a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
C standard library
Concurrency control
Database transaction
Exception handling
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Energy Efficient Security Preserving VM Live Migration In Data Centers For Cloud Computing.
Korir Sammy
,
Shengbing Ren
,
Cheruiyot Wilson
2012
Corpus ID: 1969054
Virtualization is an innovation that has widely been utilized in modern data centers for cloud computing to realize energy…
Expand
2012
2012
Formal Analysis of a Response Mechanism for TCG TOCTOU Attacks
Xiaolin Chang
,
Bin Xing
,
Ying Qin
Fourth International Conference on Multimedia…
2012
Corpus ID: 17104735
LWRM was a method for defeating TCG TOCTOU attacks with less overhead during the normal system execution. However, its security…
Expand
2012
2012
Architecture Support for Dynamic Integrity Checking
A. Kanuparthi
,
M. Zahran
,
R. Karri
IEEE Transactions on Information Forensics and…
2012
Corpus ID: 9829300
A trusted platform module (TPM) enhances the security of general purpose computer systems by authenticating the platform at boot…
Expand
2012
2012
A Taxonomy of Time and State Attacks
Horia V. Corcalciuc
Seventh International Conference on Availability…
2012
Corpus ID: 10526736
Software classifications have been created with the purpose of keeping track of attack patterns as well as providing a history of…
Expand
2012
2012
Real-time remote attestation of IaaS cloud
Zhen Xu
,
Aimin Yu
,
Wen-Yu Yang
IEEE 2nd International Conference on Cloud…
2012
Corpus ID: 7518290
Aiming at the deficiencies when deploying existing remote attestation approaches in the IaaS cloud, this paper proposes a real…
Expand
2012
2012
Robust and Efficient Response to TCG TOCTOU Attacks in TPVM
Xiaolin Chang
,
Bin Xing
,
Jiqiang Liu
,
Z. Yuan
,
Longmei Sun
International Conference on Parallel and…
2012
Corpus ID: 16327265
This paper aims to defeat TCG TOCTOU attacks occurring in trusted para-virtualized machines (TPVM). We propose a robust and…
Expand
2011
2011
Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System
Han-Chieh Wei
,
He Yeping
2011
Corpus ID: 215953217
2010
2010
Defeating TCG TOCTOU Attacks in Trusted HVM
Xiaolin Chang
,
Han Zhen
,
Ji Qiang Liu
,
Bin Xing
,
J. Muppala
International Conference on Multimedia…
2010
Corpus ID: 18082868
Virtualization technologies have been explored to mitigate the vulnerabilities in the current TCG architecture. But only a small…
Expand
2006
2006
Object capabilities for security
D. Wagner
ACM Workshop on Programming Languages and…
2006
Corpus ID: 30367799
Existing systems often do a poor job of meeting the principle of least privilege. I will discuss how object capability systems…
Expand
2006
2006
Modeling, Finding, Annalyzing and Taming TOCTTOU Vulnerabilities in Unix-Style File Systems
P. Calton
,
Wei Jinpeng
2006
Corpus ID: 155133765
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE