-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
Fall
-
Aleph One, "Smashing the stack for fun and profit," Phrack Magazine 49, Fall 1997.
-
(1997)
Phrack Magazine
, vol.49
-
-
Aleph, O.1
-
4
-
-
0013301921
-
Linux security toolkit
-
Bandel D. "Linux Security Toolkit," IDG Books, 2000.
-
(2000)
IDG Books
-
-
Bandel, D.1
-
5
-
-
84958742099
-
A tool for pro-active defense against the buffer overrun attack
-
LNCS 1485
-
Banfi R., Bruschi D., Rosti E., "A tool for pro-active defense against the buffer overrun attack," Proc. of ESORICS '98, LNCS 1485, pp. 17-31, 1998.
-
(1998)
Proc. of ESORICS '98
, pp. 17-31
-
-
Banfi, R.1
Bruschi, D.2
Rosti, E.3
-
6
-
-
84949501111
-
Less harm, less worry or hot to improve network security by bounding system, offensiveness
-
New Orleans, Dec.
-
Bruschi D., Cavallaro L., Rosti E., "Less harm, less worry or hot to improve network security by bounding system, offensiveness," ACSAC '00, 16th Annual Computer Security Application Conferences, New Orleans, Dec. 2000.
-
(2000)
ACSAC '00, 16th Annual Computer Security Application Conferences
-
-
Bruschi, D.1
Cavallaro, L.2
Rosti, E.3
-
8
-
-
0013191703
-
TCP SYN flooding attacks and IP spoofing attacks
-
CERT-CC, "TCP SYN flooding attacks and IP Spoofing attacks," CERT Advisory CA-96.21, http://www.cert.org, 1996-98.
-
(1996)
CERT Advisory CA-96.21
-
-
-
9
-
-
0013301922
-
Denial of service attack via ping
-
CERT-CC, "Denial of service attack via ping," CERT Advisory CA-96.26, http://www.cert.org, 1996-97.
-
(1996)
CERT Advisory CA-96.26
-
-
-
10
-
-
0013195017
-
IP denial of service attacks
-
CERT-CC, "IP Denial of service attacks," CERT Advisory CA-97.28, http://www.cert.org, 1997-98.
-
(1997)
CERT Advisory CA-97.28
-
-
-
11
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Ziang, "StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks," Proc. of the 7th USENIX Security Symposium, 1998.
-
(1998)
Proc. of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Ziang, Q.10
-
12
-
-
0003336855
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
January
-
Ferguson P., Senie D., "Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing," Network Working Group RFC 2267, http://www.rfc-editor.org/rfc/rfc2267.txt, January 1998.
-
(1998)
Network Working Group RFC
, vol.2267
-
-
Ferguson, P.1
Senie, D.2
-
16
-
-
0013197876
-
The limitations of intrusion detection systems on high speed networks
-
Louvain La Neuve, Belgium, Sept.
-
J. Kleinwaechter, "The limitations of intrusion detection systems on high speed networks," presented at the "First International Workshop on Recent Advances in Intrusion Detection (RAID)," http://www.zurich.ibm.com/̃dac/RAID98, Louvain La Neuve, Belgium, Sept. 1998.
-
(1998)
First International Workshop on Recent Advances in Intrusion Detection (RAID)
-
-
Kleinwaechter, J.1
-
17
-
-
0002179618
-
Protection
-
Jan.
-
Lampson B., "Protection," republished in Proc. of the 5th Princeton Symposium, Operating System Review, Vol 8, No 1, pp 18-24, Jan. 1974.
-
(1974)
Proc. of the 5th Princeton Symposium, Operating System Review
, vol.8
, Issue.1
, pp. 18-24
-
-
Lampson, B.1
-
19
-
-
84874953600
-
-
Mudge
-
Mudge, "How to write buffer overflow," http://www.10pht.com/advisories/bufero.html 1997.
-
(1997)
How to Write Buffer Overflow
-
-
-
20
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B.C. Neuman, T. Ts'o, "Kerberos: an authentication service for computer networks," IEEE Communications, Vol 32, No 9, pp 33-38, 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
22
-
-
0013242905
-
-
Open Door Networks, "Door Stop Personal Firewall," http://www2.opendoor.com/doorstop/, 2000.
-
(2000)
Door Stop Personal Firewall
-
-
-
24
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
Oakland, May
-
Schuba C.L., Krsul I.V., Kuhn M.G., Spafford E.H., Sundaram A., Zamboni D., "Analysis of a denial of service attack on TCP," Proc. of the 1997 IEEE Symposium on Security and Privacy, pp 208-223, Oakland, May 1997.
-
(1997)
Proc. of the 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
26
-
-
84881146783
-
-
Solar Designer
-
Solar Designer, "Non-Executable user stack," http://www.false.com/security/linux-stack/.
-
Non-Executable User Stack
-
-
-
29
-
-
0013192981
-
-
TinySoftware, "Tiny Personal Firewall," http://www.tinysoftware.com, 2000.
-
(2000)
Tiny Personal Firewall
-
-
|