The Security War in File Systems: An Empirical Study from A Vulnerability-Centric Perspective

04/26/2022
by   Jinghan Sun, et al.
0

This paper presents a systematic study on the security of modern file systems, following a vulnerability-centric perspective. Specifically, we collected 377 file system vulnerabilities committed to the CVE database in the past 20 years. We characterize them from four dimensions that include why the vulnerabilities appear, how the vulnerabilities can be exploited, what consequences can arise, and how the vulnerabilities are fixed. This way, we build a deep understanding of the attack surfaces faced by file systems, the threats imposed by the attack surfaces, and the good and bad practices in mitigating the attacks in file systems. We envision that our study will bring insights towards the future development of file systems, the enhancement of file system security, and the relevant vulnerability mitigating solutions.

READ FULL TEXT

page 10

page 16

page 18

research
11/30/2022

Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities

File name confusion attacks, such as malicious symbolic links and file s...
research
07/24/2023

Execution at RISC: Stealth JOP Attacks on RISC-V Applications

RISC-V is a recently developed open instruction set architecture gaining...
research
09/14/2020

Revealing the Weaknesses of File Sharing System on Cloud Storages

Cloud storage provides the simpler way to share the files privately and ...
research
08/13/2019

A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses

The blockchain technology is believed by many to be a game changer in ma...
research
01/15/2018

Attack Potential in Impact and Complexity

Vulnerability exploitation is reportedly one of the main attack vectors ...
research
08/22/2022

An Input-Aware Mimic Defense Theory and its Practice

The current security problems in cyberspace are characterized by strong ...
research
04/19/2019

Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security

The trend toward autonomous robot deployments is on an upward growth cur...

Please sign up or login with your details

Forgot password? Click here to reset