{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:20Z","timestamp":1773511040148,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"State Key Laboratory of Information Security","award":["2021-ZD-05"],"award-info":[{"award-number":["2021-ZD-05"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002386, U1804263, 62172435"],"award-info":[{"award-number":["62002386, U1804263, 62172435"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhongyuan Science and Technology Innovation Leading Talent Project","award":["214200510019"],"award-info":[{"award-number":["214200510019"]}]},{"name":"Henan Key Laboratory of Cyberspace Situation Awareness"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560666","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"891-904","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Watch Out for Race Condition Attacks When Using Android External Storage"],"prefix":"10.1145","author":[{"given":"Shaoyong","family":"Du","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Guoqing","family":"Lai","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Pinpointing Vulnerabilities. In Proceedings of the 12th ACM on Asia Conference on Computer and Communications Security (AsiaCCS '17)","author":"Chen Yue","year":"2017","unstructured":"Yue Chen , Mustakimur Khandaker , and Zhi Wang . 2017 . Pinpointing Vulnerabilities. In Proceedings of the 12th ACM on Asia Conference on Computer and Communications Security (AsiaCCS '17) . ACM, 334--345. https:\/\/doi.org\/10.1145\/3052973.3053033 10.1145\/3052973.3053033 Yue Chen, Mustakimur Khandaker, and Zhi Wang. 2017. Pinpointing Vulnerabilities. In Proceedings of the 12th ACM on Asia Conference on Computer and Communications Security (AsiaCCS '17). ACM, 334--345. https:\/\/doi.org\/10.1145\/3052973.3053033"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2889486"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2928275.2928280"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940343.2940346"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714589"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00017"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660275"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 35th ACM\/SIGAPP Symposium on Applied Computing (SAC '20)","author":"Koch Simon","year":"2020","unstructured":"Simon Koch , Tim Sauer , Martin Johns , and Giancarlo Pellegrino . 2020 . Raccoon: automated verification of guarded race conditions in web applications . In Proceedings of the 35th ACM\/SIGAPP Symposium on Applied Computing (SAC '20) . ACM, 1678--1687. https:\/\/doi.org\/10.1145\/3341105.3373855 10.1145\/3341105.3373855 Simon Koch, Tim Sauer, Martin Johns, and Giancarlo Pellegrino. 2020. Raccoon: automated verification of guarded race conditions in web applications. In Proceedings of the 35th ACM\/SIGAPP Symposium on Applied Computing (SAC '20). ACM, 1678--1687. https:\/\/doi.org\/10.1145\/3341105.3373855"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.33"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3090564"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18467-8_36"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9826-x"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/130616.130623"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23328"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security '19)","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon , \u00c1 lvaro Feal, Primal Wijesekera , Amit Elazari Bar On , Narseo Vallina-Rodriguez , and Serge Egelman . 2019 . 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System . In Proceedings of the 28th USENIX Security Symposium (USENIX Security '19) . USENIX Association, 603--620. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/reardon Joel Reardon, \u00c1 lvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System. In Proceedings of the 28th USENIX Security Symposium (USENIX Security '19). USENIX Association, 603--620. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/reardon"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196508"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23407"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212504"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 21th USENIX Security Symposium (USENIX Security '12)","author":"Vijayakumar Hayawardh","year":"2012","unstructured":"Hayawardh Vijayakumar , Joshua Schiffman , and Trent Jaeger . 2012 . STING: Finding Name Resolution Vulnerabilities in Programs . In Proceedings of the 21th USENIX Security Symposium (USENIX Security '12) . USENIX Association, 585--599. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/vijayakumar Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger. 2012. STING: Finding Name Resolution Vulnerabilities in Programs. In Proceedings of the 21th USENIX Security Symposium (USENIX Security '12). USENIX Association, 585--599. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/vijayakumar"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970337"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4345"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931052"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092724"},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST '05)","author":"Wei Jinpeng","year":"2005","unstructured":"Jinpeng Wei and Calton Pu . 2005 . TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study . In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST '05) . USENIX Association, 155--167. http:\/\/www.usenix.org\/events\/fast05\/tech\/wei.html Jinpeng Wei and Calton Pu. 2005. TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study. In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST '05). USENIX Association, 155--167. http:\/\/www.usenix.org\/events\/fast05\/tech\/wei.html"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00078"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00017"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741966"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the 2nd International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS '16 (Lecture Notes in Computer Science","volume":"102","author":"Yung Jonathan","year":"2016","unstructured":"Jonathan Yung , Herv\u00e9 Debar , and Louis Granboulan . 2016 . Security Issues and Mitigation in Ethernet POWERLINK . In Proceedings of the 2nd International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS '16 (Lecture Notes in Computer Science , Vol. 10166). Springer, 87-- 102 . https:\/\/doi.org\/10.1007\/978--3--319--61437--3_6 10.1007\/978--3--319--61437--3_6 Jonathan Yung, Herv\u00e9 Debar, and Louis Granboulan. 2016. Security Issues and Mitigation in Ethernet POWERLINK. In Proceedings of the 2nd International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS '16 (Lecture Notes in Computer Science, Vol. 10166). Springer, 87--102. https:\/\/doi.org\/10.1007\/978--3--319--61437--3_6"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.33"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23061"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560666","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":30,"alternative-id":["10.1145\/3548606.3560666","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560666","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}