Skip to search formSkip to main contentSkip to account menu

Time of check to time of use

Known as: TOCTOU, TOCTTOU, Time-of-check-to-time-of-use 
In software development, time of check to time of use (TOCTTOU or TOCTOU, pronounced "TOCK too") is a class of software bug caused by changes in a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Virtualization is an innovation that has widely been utilized in modern data centers for cloud computing to realize energy… 
2012
2012
LWRM was a method for defeating TCG TOCTOU attacks with less overhead during the normal system execution. However, its security… 
2012
2012
A trusted platform module (TPM) enhances the security of general purpose computer systems by authenticating the platform at boot… 
2012
2012
Software classifications have been created with the purpose of keeping track of attack patterns as well as providing a history of… 
2012
2012
Aiming at the deficiencies when deploying existing remote attestation approaches in the IaaS cloud, this paper proposes a real… 
2012
2012
This paper aims to defeat TCG TOCTOU attacks occurring in trusted para-virtualized machines (TPVM). We propose a robust and… 
2010
2010
Virtualization technologies have been explored to mitigate the vulnerabilities in the current TCG architecture. But only a small… 
2006
2006
Existing systems often do a poor job of meeting the principle of least privilege. I will discuss how object capability systems…