Understanding security vulnerabilities in file systems

Miao Cai, Hao Huang, Jian Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

File systems have been developed for decades with the securitycritical foundation provided by operating systems. However, they are still vulnerable to malware attacks and software defects. In this paper, we undertake the first attempt to systematically understand the security vulnerabilities in various file systems. We conduct an empirical study of 157 real cases reported in Common Vulnerabilities and Exposures (CVE). We characterize the file system vulnerabilities in different dimensions that include the common vulnerabilities leveraged by adversaries to initiate their attacks, their exploitation procedures, root causes, consequences, and mitigation approaches. We believe the insights derived from this study have broad implications related to the further enhancement of the security aspect of file systems, and the associated vulnerability detection tools.

Original languageEnglish (US)
Title of host publicationProceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, APSys 2019
PublisherAssociation for Computing Machinery
Pages8-15
Number of pages8
ISBN (Electronic)9781450368933
DOIs
StatePublished - Aug 19 2019
Event10th ACM SIGOPS Asia-Pacific Workshop on Systems, APSys 2019 - Hangzhou, China
Duration: Aug 19 2019Aug 20 2019

Publication series

NameProceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, APSys 2019

Conference

Conference10th ACM SIGOPS Asia-Pacific Workshop on Systems, APSys 2019
Country/TerritoryChina
CityHangzhou
Period8/19/198/20/19

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Understanding security vulnerabilities in file systems'. Together they form a unique fingerprint.

Cite this