Mathias Josef Payer, Zhenyu Wu
setuid system calls enable critical functions such as user authentications and modular privileged components. Such operations must only be executed after careful validation. However, current systems do not perform rigorous checks, allowing exploitation of ...
ASSOC COMPUTING MACHINERY2019