Fixing races for fun and profit: how to abuse atimeJan 1, 2005·Nikita Borisov,Rob Johnson,Naveen Sastry,David Wagner· 0 min read CiteTypeConference paperPublicationUSENIX SecurityLast updated on Jan 1, 2005 ← Verifying security properties using type-qualifier inference Jan 1, 2006Finding user/kernel pointer bugs with type inference. Jan 1, 2004 →