Software Security

Table of Contents

Simple attacks

Program behavior depends on:

find a target:

File system attacks, e.g. symbolic links which aren’t checked, or which can change between calls (time-of-check to time-of-use attack – that’s why access() is insecure)

Principle of least privilege: every program and privileged user of system should operate using the least amount of privilege necessary to complete the job