POC for a race condition exploit using directory junctions in Windows
-
Updated
Apr 26, 2020 - C
POC for a race condition exploit using directory junctions in Windows
Machine Programming II Project for the 2018-2019 course of the Computer Science degree at the University of Havana, Cuba.
converted existing single-thread, contiguous file-allocation, file system into a multi-threaded, multi-level indexed file-allocation file system
Operating System course 62588 taken at DTU Copenhagen
A process synchronization problem.
Learning more about parallelism and concurrency by solving the classic "Dining Philosphers Problem" in a multi-threaded C program.
OS PRACTICAL IMPLEMENTATION
oprating system topic programed in c
Repositório de implementações e projetos da disciplina Programação Concorrente, realizada no semestre de 2023.1
A restaurant simulation that makes use of shared data structures between multiple processes with the help of semaphore mutexes as homework for the Operating Systems class
Valgrind for Android
README file
PoC and notes about TOCTOU (race condition) vulnerability in C language and tested on GNU/Linux (Ubuntu 16.04).
Dining philosophers problem solved, synchronization issues...
Operating System module assignment documentation
priority CPU-Scheduling for Pintos, using a multilevel feedback queue system
Simple programs written in C in order to synchronize processes and threads to avoid race conditions. University project for the course "Operating Systems". Course Code: CEID_NY330
Add a description, image, and links to the race-conditions topic page so that developers can more easily learn about it.
To associate your repository with the race-conditions topic, visit your repo's landing page and select "manage topics."