1
Christopher F Kime, Brian H Horton, Christian Lita: Method for preventing time of check to time of use exploits. International Business Machines Corporation, Stephen J Walder Jr, Jeffrey S LeBaw, February 2, 2010: US07657936

A method for preventing time of check to time of use exploits includes receiving a system call from a user space at a system call intercept and copying user space parameters from the user space to a kernel space responsive to the system call. The method also includes copying the user space parameter ...


2
Christopher F Kime, Brian H Horton, Christian Lita: Method for preventing time of check to time of use exploits. Ibm, c o CARDINAL LAW GROUP, August 23, 2007: US20070199045-A1

A method for preventing time of check to time of use exploits includes receiving a system call from a user space at a system call intercept and copying user space parameters from the user space to a kernel space responsive to the system call. The method also includes copying the user space parameter ...



Click the thumbnails below to visualize the patent trend.