Interprocess communications channels are attacked in order to
subvert normal functioning. Examples include the introduction of false
interprocess signals in a network interprocess communications protocol
causing misbehavior of trusted programs, the disruption of interprocess
communications by resource exhaustion so as to prevent proper checking or
reduce or eliminate functionality, and observation of interprocess
communications stored in shared temporary data files so as to gain
unauthorized information.
Complexity: Interprocess communication attacks
oriented toward disruption appear to be easily accomplished, but no
mathematical analysis of this class of attacks has been published to date.
fc@red.a.net