...
Allowing operations that are appropriate only for files to be performed on devices can result in in denial-of-service attacks or more serious exploits depending on the platform.
...
| [Garfinkel 1996] | Section 5.6, "Device Files" | ||
| [Howard 2002] | Chapter 11, "Canonical Representation Issues" | ||
| [IEEE Std 1003.1:2013] | XSH, System Interfaces, open | [Howard 2002] | Chapter 11, "Canonical Representation Issues"
...