-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
Nov.
-
Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 49(14), Nov. 1996. http://www.phrack.org/phrack/49/P49-14.
-
(1996)
Phrack Magazine
, vol.49
, Issue.14
-
-
-
2
-
-
84860095094
-
Once upon a free()
-
Aug.
-
Anonymous. Once upon a free(). Phrack Magazine, 57(9), Aug. 2001. http://www.phrack.org/phrack/57/p57-0x09.
-
(2001)
Phrack Magazine
, vol.57
, Issue.9
-
-
-
4
-
-
84860108788
-
-
June
-
Apache Software Foundation. ASF bulletin 20020617, June 2002. http://httpd.apache.org/info/security_bulletin_20020617.txt.
-
(2002)
ASF Bulletin 20020617
-
-
-
5
-
-
84860107517
-
-
June
-
Apache Software Foundation. ASF bulletin 20020620, June 2002. http://httpd.apache.org/info/security_bulletin_20020620.txt.
-
(2002)
ASF Bulletin 20020620
-
-
-
6
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
ACM Press, Oct.
-
E. G. Barrantes, D. H. Ackley, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proc. 10th ACM Conf. Comp. and Comm. Sec. - CCS 2003, pages 281-9. ACM Press, Oct. 2003.
-
(2003)
Proc. 10th ACM Conf. Comp. and Comm. Sec. - CCS 2003
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Stefanovic, D.4
Zovi, D.D.5
-
7
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
V. Paxson, editor, USENIX, Aug.
-
S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In V. Paxson, editor, Proc. 12th USENIX Sec. Symp., pages 105-20. USENIX, Aug. 2003.
-
(2003)
Proc. 12th USENIX Sec. Symp.
, pp. 105-120
-
-
Bhatkar, S.1
Duvarney, D.2
Sekar, R.3
-
8
-
-
17644393012
-
Bypassing stackGuard and StackShield
-
May
-
Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack Magazine, 56(5), May 2000. http://www.phrack.org/phrack/56/p56-0x05.
-
(2000)
Phrack Magazine
, vol.56
, Issue.5
-
-
-
9
-
-
84860106943
-
-
June
-
CERT, June 2002. http://www.cert.org/advisories/CA-2002-17.html.
-
(2002)
-
-
-
12
-
-
4243572705
-
How to use a 64-bit address space
-
University of Washington, Department of Computer Science and Engineering, March
-
J. S. Chase, H. M. Levy, M. Baker-Harvey, and E. D. Lazowska. How to use a 64-bit address space. Technical Report 92-03-02, University of Washington, Department of Computer Science and Engineering, March 1992.
-
(1992)
Technical Report 92-03-02
-
-
Chase, J.S.1
Levy, H.M.2
Baker-Harvey, M.3
Lazowska, E.D.4
-
13
-
-
85009448253
-
PointGuard: Protecting pointers from buffer overflow vulnerabilities
-
V. Paxson, editor, USENIX, Aug.
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In V. Paxson, editor, Proc. 12th USENIX Sec. Symp., pages 91-104. USENIX, Aug. 2003.
-
(2003)
Proc. 12th USENIX Sec. Symp.
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
14
-
-
85084160243
-
StackGuard: Automatic detection and prevention of buffer-overflow attacks
-
A. Rubin, editor, USENIX, Jan.
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic detection and prevention of buffer-overflow attacks. In A. Rubin, editor, Proc. 7th USENIX Sec. Symp., pages 63-78. USENIX, Jan. 1998.
-
(1998)
Proc. 7th USENIX Sec. Symp.
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
15
-
-
14844288825
-
Bypassing PaX ASLR protection
-
June
-
T. Durden. Bypassing PaX ASLR protection. Phrack Magazine, 59(9), June 2002. http://www.phrack.org/phrack/59/p59-0x09.
-
(2002)
Phrack Magazine
, vol.59
, Issue.9
-
-
Durden, T.1
-
16
-
-
14844332687
-
ProPolice: Improved stack-smashing attack detection
-
Oct.
-
H. Etoh and K. Yoda. ProPolice: Improved stack-smashing attack detection. IPSJ SIGNotes Computer SECurity, 014(025), Oct. 2001. http://www.trl.ibm.com/ projects/security/ssp.
-
(2001)
IPSJ SIGNotes Computer SECurity
, vol.14
, Issue.25
-
-
Etoh, H.1
Yoda, K.2
-
17
-
-
26844521052
-
-
Feb.
-
PedCIRC. BotNets: Detection and mitigation, Feb. 2003. http://www.fedcirc.gov/library/documents/botNetsv32.doc.
-
(2003)
BotNets: Detection and Mitigation
-
-
-
18
-
-
0030697765
-
Building diverse computer systems
-
J. Mogul, editor. IEEE Computer Society, May
-
S. Forrest, A. Somayaji, and D. Ackley. Building diverse computer systems. In J. Mogul, editor, Proc. 6th Work. Hot Topics in Operating Sys. - HotOS 1997, pages 67-72. IEEE Computer Society, May 1997.
-
(1997)
Proc. 6th Work. Hot Topics in Operating Sys. - HotOS 1997
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.3
-
19
-
-
14844282642
-
Cybersecurity: The cost of monopoly - How the dominance of Microsoft's products poses a risk to security
-
Comp. and Comm. Ind. Assn.
-
D. Geer, R. Bace, P. Gutmann, P. Metzger, C. Pfleeger, J. Quarterman, and B. Schneier. Cybersecurity: The cost of monopoly - how the dominance of Microsoft's products poses a risk to security. Technical report, Comp. and Comm. Ind. Assn., 2003.
-
(2003)
Technical Report
-
-
Geer, D.1
Bace, R.2
Gutmann, P.3
Metzger, P.4
Pfleeger, C.5
Quarterman, J.6
Schneier, B.7
-
20
-
-
14844307465
-
Vudo malloc tricks
-
Aug.
-
M. Kaempf. Vudo malloc tricks. Phrack Magazine, 57(8), Aug. 2001. http://www.phrack.org/phrack/57/p57-0x08.
-
(2001)
Phrack Magazine
, vol.57
, Issue.8
-
-
Kaempf, M.1
-
23
-
-
14844331622
-
Bot software spreads, causes new worries
-
June
-
L. McLaughlin. Bot software spreads, causes new worries. IEEE Distributed Systems Online, 5(6), June 2004. http://csd1.computer.org/comp/mags/ds/2004/06/ 06001.pdf.
-
(2004)
IEEE Distributed Systems Online
, vol.5
, Issue.6
-
-
McLaughlin, L.1
-
24
-
-
3042642332
-
The advanced return-into-lib(c) exploits (PaX case study)
-
Dec.
-
Nergal. The advanced return-into-lib(c) exploits (PaX case study). Phrack Magazine, 58(4), Dec. 2001. http://www.phrack.org/phrack/58/p58-0x04.
-
(2001)
Phrack Magazine
, vol.58
, Issue.4
-
-
Nergal1
-
25
-
-
84902233195
-
A simple way to estimate the cost of downtime
-
A. Couch, editor. USENIX, Nov.
-
D. Patterson. A simple way to estimate the cost of downtime. In A. Couch, editor, Proc. 16th Systems Administration Conf. - LISA 2002, pages 185-8. USENIX, Nov. 2002.
-
(2002)
Proc. 16th Systems Administration Conf. - LISA 2002
, pp. 185-188
-
-
Patterson, D.1
-
26
-
-
84860093864
-
-
PaX Team. PaX. http://pax.grsecurity.net.
-
-
-
-
29
-
-
84860106529
-
StackPatch
-
Solar Designer. StackPatch. http://www.openvall.com/linux.
-
Solar Designer
-
-
-
30
-
-
79956011976
-
"return-to-libc" attack
-
Bugtraq, Aug.
-
Solar Designer, "return-to-libc" attack. Bugtraq, Aug. 1997.
-
(1997)
Solar Designer
-
-
-
31
-
-
85084162258
-
How to own the Internet in your spare time
-
D. Boneh, editor, USENIX, Aug.
-
S. Staniford, V. Paxson, and N. Weaver. How to own the Internet in your spare time. In D. Boneh, editor, Proc. 11th USENIX Sec. Symp., pages 149-67. USENIX, Aug. 2002.
-
(2002)
Proc. 11th USENIX Sec. Symp.
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
32
-
-
84860093865
-
StackShield
-
Vendicator. StackShield. http://www.angelfire.com/sk/stackshield.
-
Vendicator
-
-
-
33
-
-
27644457078
-
Transparent runtime randomization for security
-
A. Fantechi, editor, IEEE Computer Society, Oct.
-
J. Xu, Z. Kalbarczyk, and R. Iyer. Transparent runtime randomization for security. In A. Fantechi, editor, Proc. 22nd Symp. on Reliable Distributed Systems - SRDS 2003, pages 260-9. IEEE Computer Society, Oct. 2003.
-
(2003)
Proc. 22nd Symp. on Reliable Distributed Systems - SRDS 2003
, pp. 260-269
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.3
|