메뉴 건너뛰기




Volumn 1, Issue , 2003, Pages 120-129

Defcon Capture the Flag: Defending vulnerable code from intense attack

Author keywords

Computer crime; Computer security; File servers; Internet; Large scale systems; Law; Legal factors; Research and development; Testing; Web server

Indexed keywords

COMPUTER CRIME; INTERNET; LARGE SCALE SYSTEMS; PERSONAL COMPUTING; SECURITY OF DATA; SECURITY SYSTEMS; TESTING;

EID: 20444493210     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2003.1194878     Document Type: Conference Paper
Times cited : (51)

References (18)
  • 1
    • 0030092390 scopus 로고    scopus 로고
    • Checking for Race Conditions in File Accesses
    • Spring Also available at url
    • M.Bishop and M. Digler. Checking for Race Conditions in File Accesses. Computing Systems, 9(2):131-152, Spring 1996. Also available at url http://olympus.cs.ucdavis.edu/bishop/scriv/index.html.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Digler, M.2
  • 3
    • 84942265508 scopus 로고    scopus 로고
    • September
    • Jamie Cameron. Webmin. url http://www.webmin.com/, September 2002.
    • (2002)
    • Cameron, J.1
  • 9
    • 0002582136 scopus 로고    scopus 로고
    • Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade
    • Also Presented As An Invited Talk at SANS 2000, March 23-26, 2000, Orlando, FL
    • Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole. Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade. In DARPA Information Survivability Conference and Expo (DISCEX), January 2000. Also presented as an invited talk at SANS 2000, March 23-26, 2000, Orlando, FL, url http://schafercorp-ballston.com/discex.
    • DARPA Information Survivability Conference and Expo (DISCEX), January 2000
    • Cowan, C.1    Wagle, P.2    Pu, C.3    Beattie, S.4    Walpole, J.5
  • 11
    • 84942265514 scopus 로고    scopus 로고
    • August
    • Renaud Deraison et al. Nessus. url http://www.nessus.org/, August 2002.
    • (2002)
    • Deraison, R.1
  • 13
    • 84942265516 scopus 로고    scopus 로고
    • "Ghettohackers". The Ghettohackers. url http://ghettohackers.net/.
    • Ghettohackers
  • 14
    • 78651404114 scopus 로고    scopus 로고
    • CNet news.com, August 5
    • Robert Lemos. Putting Fun Back Into Hacking. CNet news.com, url http://news.com.com/2100-1001-948404.html, August 5 2002.
    • (2002) Putting Fun Back Into Hacking
    • Lemos, R.1
  • 15
    • 12344288334 scopus 로고    scopus 로고
    • Format String Attacks
    • September 9
    • Tim Newsham. Format String Attacks. Bugtraq mailing list, url http://www.securityfocus.com/archive/1/81565, September 9 2000.
    • (2000) Bugtraq Mailing List
    • Newsham, T.1
  • 16
    • 0006100649 scopus 로고    scopus 로고
    • Smashing The Stack For Fun And Profit
    • Aleph One. November
    • "Aleph One". Smashing The Stack For Fun And Profit. Phrack, 7(49), November 1996.
    • (1996) Phrack , vol.7 , Issue.49


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.