-
1
-
-
33748509415
-
"AMD Chips Include New Buffer Overflow Protection"
-
AMD
-
AMD, "AMD Chips Include New Buffer Overflow Protection," http://www.computerweekly.com/Article127571.htm, 2004.
-
(2004)
-
-
-
2
-
-
33748492657
-
"Execute Disable (XD) Bit"
-
Intel
-
Intel, "Execute Disable (XD) Bit," http://www.intel.com/business/bss/ infrastructure/security/xdbit.htm, 2001.
-
(2001)
-
-
-
3
-
-
33748497918
-
"AntiVirusNX Technology"
-
T. Corporation
-
T. Corporation, "AntiVirusNX Technology," http://www.transmeta.com/officeon/antivirusnx.html, 2004.
-
(2004)
-
-
-
4
-
-
33748505754
-
"Microsoft Windows XP SP2 Data Execution Prevention"
-
Microsoft
-
Microsoft, "Microsoft Windows XP SP2 Data Execution Prevention," http://www.microsoft.com/technet/prodtechnol/ winxppro/maintain/sp2mempr.mspx, 2004.
-
(2004)
-
-
-
5
-
-
0006100649
-
"Smashing the Stack for Fun and Profit"
-
Aleph1, Nov
-
Aleph1, "Smashing the Stack for Fun and Profit," Phrack Magazine, vol. 7, no. 49, Nov. 1996, http://www.phrack.org/show.php?p =49&a=14.
-
(1996)
Phrack Magazine
, vol.7
, Issue.49
-
-
-
6
-
-
33748497917
-
"CERT Incident Note IN-2001-08 Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service DLL"
-
CERT Coordination Center, June
-
CERT Coordination Center, "CERT Incident Note IN-2001-08 Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service DLL," http:// www.cert.org/incident_notes/IN-2001-08.html, June 2001.
-
(2001)
-
-
-
7
-
-
33748515550
-
"CERT Incident Note IN-2001-09 Code Red II: Another Worm Exploiting Buffer Overflow In IIS Indexing Service DLL"
-
CERT Coordination Center, Aug
-
CERT Coordination Center, "CERT Incident Note IN-2001-09 Code Red II: Another Worm Exploiting Buffer Overflow In IIS Indexing Service DLL," http://www.cert.org/incident_notes/IN-2001-09.html, Aug. 2001.
-
(2001)
-
-
-
8
-
-
2442611534
-
"CERT Advisory CA-2003-20 W32/Blaster Worm"
-
CERT Coordination Center, Aug
-
CERT Coordination Center, "CERT Advisory CA-2003-20 W32/Blaster Worm," http://www.cert.org/advisories/CA-2003-20.html, Aug. 2003.
-
(2003)
-
-
-
9
-
-
33748505107
-
"W32/Nachi-A"
-
Sophos Virus Analysis, Aug
-
Sophos Virus Analysis, "W32/Nachi-A," http://www.sophos.com/virusinfo/ analyses/w32nachia.html, Aug. 2003.
-
(2003)
-
-
-
10
-
-
33748490939
-
"W32/Sasser"
-
Sophos Virus Analysis, May
-
Sophos Virus Analysis, "W32/Sasser," http://www.eeye.com/html/research/ advisories/AD20040501.html, May 2004.
-
(2004)
-
-
-
11
-
-
33748504889
-
"CERT Advisory CA-2001-13 Buffer Overflow in IIS Indexing Service DLL"
-
CERT Coordination Center, June
-
CERT Coordination Center, "CERT Advisory CA-2001-13 Buffer Overflow in IIS Indexing Service DLL," http://www.cert.org/advisories/ CA-2001-13.html, June 2001.
-
(2001)
-
-
-
12
-
-
33748493887
-
"CERT Vulnerability Note VU 568148 Microsoft Windows RPC Vulnerable to Buffer Overflow"
-
CERT Coordination Center, July
-
CERT Coordination Center, "CERT Vulnerability Note VU 568148 Microsoft Windows RPC Vulnerable to Buffer Overflow," http://www.kb.cert.org/vuls/ id/568148, July 2003.
-
(2003)
-
-
-
13
-
-
33748487700
-
"CERT Coordination Center Advisories for 2002"
-
CERT Coordination Center
-
CERT Coordination Center, "CERT Coordination Center Advisories for 2002," http://www.cert.org/advisories/#2002, 2002.
-
(2002)
-
-
-
14
-
-
33748500924
-
"SANS/FBI Top 20 List, the Twenty Most Critical Internet Security Vulnerabilities"
-
SANS Institute
-
SANS Institute, "SANS/FBI Top 20 List, the Twenty Most Critical Internet Security Vulnerabilities," http://www.sans.org/top20/ oct02.php, 2002.
-
(2002)
-
-
-
15
-
-
33748516461
-
"CERT Coordination Center Advisories for 2003"
-
CERT Coordination Center
-
CERT Coordination Center, "CERT Coordination Center Advisories for 2003," http://www.cert.org/advisories/#2003, 2003.
-
(2003)
-
-
-
16
-
-
33748502838
-
"SANS Top 20 List, The Twenty Most Critical Internet Security Vulnerabilities"
-
SANS Institute
-
SANS Institute, "SANS Top 20 List, The Twenty Most Critical Internet Security Vulnerabilities," http://www.sans.org/top20/, 2003.
-
(2003)
-
-
-
17
-
-
33748480777
-
"Format String Vulnerabilities"
-
Scut, Sept
-
Scut, "Format String Vulnerabilities," http://teso.scene.at/articles/ formatstring, Sept. 2001.
-
(2001)
-
-
-
18
-
-
12344288334
-
"Format String Attacks"
-
Sept
-
T. Newsham, "Format String Attacks," http://www.lava.net/newsham/ format-string-attacks.pdf, Sept. 2000.
-
(2000)
-
-
Newsham, T.1
-
19
-
-
26844531642
-
"Basic Integer Overflows"
-
Blexim, Dec
-
Blexim, "Basic Integer Overflows," Phrack Magazine, vol. 11, no. 60, Dec. 2002, http://www.phrack.org/show.php?p=60&a=10.
-
(2002)
Phrack Magazine
, vol.11
, Issue.60
-
-
-
20
-
-
33748501153
-
"Linux Kernel Patch from the Openwall Project: Non-Executable User Stack"
-
Jan
-
S. Designer, "Linux Kernel Patch from the Openwall Project: Non-Executable User Stack," http://www.openwall.com/linux/README, Jan. 2001.
-
(2001)
-
-
Designer, S.1
-
21
-
-
33748499445
-
-
The SmashGuard Group, SmashGuard Web Site
-
The SmashGuard Group, SmashGuard Web Site, http://www.smashguard.org/, 2003.
-
(2003)
-
-
-
22
-
-
20344393792
-
"A Comparison of Publicly Available Tools for Static Intrusion Prevention"
-
Nov
-
J. Wilander and M. Kamkar, "A Comparison of Publicly Available Tools for Static Intrusion Prevention," Proc. Seventh Nordic Workshop Secure IT Systems, pp. 68-84, Nov. 2002.
-
(2002)
Proc. Seventh Nordic Workshop Secure IT Systems
, pp. 68-84
-
-
Wilander, J.1
Kamkar, M.2
-
23
-
-
85081874807
-
"A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities"
-
Feb
-
D. Wagner, J.S. Foster, E.A. Brewer, and A. Aiken, "A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities," Proc. Network and Distributed System Security Symp., pp. 3-7, Feb. 2000.
-
(2000)
Proc. Network and Distributed System Security Symp.
, pp. 3-7
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
24
-
-
0037702242
-
"CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows in C"
-
June
-
N. Dor, M. Rodeh, and M. Sagiv, "CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows in C," Proc. ACM SIGPLAN 2003 Conf. Programming Language Design and Implementation, pp. 155-167, June 2003.
-
(2003)
Proc. ACM SIGPLAN 2003 Conf. Programming Language Design and Implementation
, pp. 155-167
-
-
Dor, N.1
Rodeh, M.2
Sagiv, M.3
-
25
-
-
85084164558
-
"Statically Detecting Likely Buffer Overflow Vulnerabilities"
-
Aug
-
D. Larochelle and D. Evans, "Statically Detecting Likely Buffer Overflow Vulnerabilities," Proc. 10th USENIX Security Symp., pp. 177-190, Aug. 2001.
-
(2001)
Proc. 10th USENIX Security Symp.
, pp. 177-190
-
-
Larochelle, D.1
Evans, D.2
-
29
-
-
84862209017
-
"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits"
-
Aug
-
S. Bhatkar, D.C. DuVarney, and R. Sekar, "Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits," Proc. 12th USENIX Security Symp., pp. 105-120, Aug. 2003.
-
(2003)
Proc. 12th USENIX Security Symp.
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
30
-
-
33748487283
-
-
The PaX Team, PaX
-
The PaX Team, PaX, http://pageexec.virtualave.net/, 2001.
-
(2001)
-
-
-
31
-
-
2642520196
-
"A Binary Rewriting Defense against Stack Based Buffer Overflow Attacks"
-
June
-
M. Prasad and T. Chiueh, "A Binary Rewriting Defense against Stack Based Buffer Overflow Attacks," Proc. Usenix Ann. Technical Conf., General Track, pp. 211-224, June 2003.
-
(2003)
Proc. Usenix Ann. Technical Conf., General Track
, pp. 211-224
-
-
Prasad, M.1
Chiueh, T.2
-
32
-
-
33748508315
-
"Visual C++ Option to Tighten Security"
-
Microsoft
-
Microsoft, "Visual C++ Option to Tighten Security," http:// archive.devx.com/security/bestdefense/2001/mh0301/mh03011.asp, 2001.
-
(2001)
-
-
-
33
-
-
85084160243
-
"StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks"
-
Jan
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. Seventh USENIX Security Conf., pp. 63-78, Jan. 1998.
-
(1998)
Proc. Seventh USENIX Security Conf.
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
34
-
-
34248505656
-
"Protecting Systems from Stack Smashing Attacks with Stack-Guard"
-
May
-
C. Cowan, S. Beattie, R.F. Day, C. Pu, P. Wagle, and E. Walthinsen, "Protecting Systems from Stack Smashing Attacks with Stack-Guard," Proc. Fifth Linux Expo, May 1999, http://www.cse.ogi.edu/DISC/projects/ immunix/lexpo.ps.gz.
-
(1999)
Proc. Fifth Linux Expo
-
-
Cowan, C.1
Beattie, S.2
Day, R.F.3
Pu, C.4
Wagle, P.5
Walthinsen, E.6
-
35
-
-
17644393012
-
"Bypassing StackGuard and StackShield"
-
Bulba and Kil3r, May
-
Bulba and Kil3r, "Bypassing StackGuard and StackShield," Phrack Magazine, vol. 10, no. 56, May 2000, http://www.phrack.org/ show.php?p=56&a=5.
-
(2000)
Phrack Magazine
, vol.10
, Issue.56
-
-
-
36
-
-
84860103711
-
"StackShield: A 'Stack Smashing' Technique Protection Tool for Linux"
-
Vendicator, Jan
-
Vendicator, "StackShield: A 'Stack Smashing' Technique Protection Tool for Linux," http://www.angelfire.com/sk/stackshield/download.html, Jan. 2001.
-
(2001)
-
-
-
38
-
-
33748494346
-
"GCC Extension for Protecting Applications from Stack-Smashing Attacks"
-
Apr
-
H. Etoh, "GCC Extension for Protecting Applications from Stack-Smashing Attacks," IBM Research, http://www.trl.ibm.com/projects/security/ssp/, Apr. 2003.
-
(2003)
IBM Research
-
-
Etoh, H.1
-
39
-
-
33748510667
-
-
The OpenBSD Project, Apr
-
The OpenBSD Project, http://www.openbsd.org/, Apr. 2003.
-
(2003)
-
-
-
40
-
-
85009448253
-
"Pointguard: Protecting Pointers from Buffer Overflow Vulnerabilities"
-
Aug
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle, "Pointguard: Protecting Pointers from Buffer Overflow Vulnerabilities," Proc. 12th USENIX Security Symp., pp. 91-104, Aug. 2003.
-
(2003)
Proc. 12th USENIX Security Symp.
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
41
-
-
33748510270
-
"OpenSSL"
-
Various
-
Various, "OpenSSL," http://www.openssl.org/, 2004.
-
(2004)
-
-
-
43
-
-
0013294751
-
"FreeBSD Stack Integrity Patch"
-
A. Snarskii, "FreeBSD Stack Integrity Patch," ftp://ftp.lucky.net/pub/ unix/local/libc-letter, 1997.
-
(1997)
-
-
Snarskii, A.1
-
44
-
-
33748498337
-
"Libparanoia"
-
Apr
-
A. Snarskii, "Libparanoia," http://www.lexa.ru/snar/libparanoia/, Apr. 2000.
-
(2000)
-
-
Snarskii, A.1
-
45
-
-
21644485343
-
"Libsafe: Protecting Critical Elements of Stacks"
-
technical report, Bell Labs, Lucent Technologies, Murray Hill, N.J., Dec
-
A. Baratloo, T.K. Tsai, and N. Singh, "Libsafe: Protecting Critical Elements of Stacks," technical report, Bell Labs, Lucent Technologies, Murray Hill, N.J., Dec. 1999, http://www.bell-labs.com/org/11356/ libsafe.html.
-
(1999)
-
-
Baratloo, A.1
Tsai, T.K.2
Singh, N.3
-
46
-
-
85084160891
-
"Transparent Run-Time Defense against Stack Smashing Attacks"
-
June
-
A. Baratloo, N. Singh, and T. Tsai, "Transparent Run-Time Defense against Stack Smashing Attacks," Proc. USENIX Ann. Technical Conf., pp. 251-262, June 2000.
-
(2000)
Proc. USENIX Ann. Technical Conf.
, pp. 251-262
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
47
-
-
0012528068
-
"Libsafe 2.0: Detection of Format String Vulnerability Exploits"
-
Technical Report ALR-2001-019, Avaya Labs, Avaya Inc., Basking Ridge, N.J., Aug
-
T. Tsai and N. Singh, "Libsafe 2.0: Detection of Format String Vulnerability Exploits," Technical Report ALR-2001-019, Avaya Labs, Avaya Inc., Basking Ridge, N.J., Aug. 2001, http:// www.research.avayalabs.com/techreport/ALR-2001-019-paper.pdf.
-
(2001)
-
-
Tsai, T.1
Singh, N.2
-
48
-
-
85084161775
-
"FormatGuard: Automatic Protection from Print Format String Vulnerabilities"
-
Aug
-
C. Cowan, M. Barringer, S. Beattie, G. Kroah-Hartman, M. Frantzen, and J. Lokier, "FormatGuard: Automatic Protection from Print Format String Vulnerabilities," Proc 2001 USENIX Security Conf., pp. 191-200, Aug. 2001.
-
(2001)
Proc 2001 USENIX Security Conf.
, pp. 191-200
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
Frantzen, M.5
Lokier, J.6
-
49
-
-
85084163372
-
"StackGhost: Hardware Facilitated Stack Protection"
-
Aug
-
M. Frantzen and M. Shuey, "StackGhost: Hardware Facilitated Stack Protection," Proc. 10th USENIX Security Symp., pp. 55-66, Aug. 2001.
-
(2001)
Proc. 10th USENIX Security Symp.
, pp. 55-66
-
-
Frantzen, M.1
Shuey, M.2
-
50
-
-
33748505753
-
"Reply to Non-Executable Stack Patch"
-
Aug
-
L. Torvalds, "Reply to Non-Executable Stack Patch," http://old.lwn.net/ 1998/0806/a/linus-noexec.html, Aug. 1998.
-
(1998)
-
-
Torvalds, L.1
-
51
-
-
33748517719
-
-
GNU Compiler Collection Internals
-
GNU Compiler Collection Internals, http://gcc.gnu.org/onlinedocs/gccint/ Trampolines.html, 2004.
-
(2004)
-
-
-
52
-
-
33748485487
-
-
The OpenBSD 3.3 Apr
-
The OpenBSD 3.3, http://www.openbsd.org/33.html, Apr. 2003.
-
(2003)
-
-
-
53
-
-
12344316966
-
"Architecture Support for Defending against Buffer Overflow Attacks"
-
Oct
-
J. Xu, Z. Kalbarczyk, S. Patel, and R.K. Iyer, "Architecture Support for Defending against Buffer Overflow Attacks," Proc. Workshop Evaluating and Architecting System Dependability (EASY-2002), Oct. 2002.
-
(2002)
Proc. Workshop Evaluating and Architecting System Dependability (EASY-2002)
-
-
Xu, J.1
Kalbarczyk, Z.2
Patel, S.3
Iyer, R.K.4
-
54
-
-
21644489172
-
"Enlisting Hardware Architecture to Thwart Malicious Code Injecttion"
-
Mar
-
R.B. Lee, D.K. Karig, J.P. McGregor, and Z. Shi, "Enlisting Hardware Architecture to Thwart Malicious Code Injecttion," Proc. Int'l Conf. Security in Pervasive Computing (SPC-2003), Mar. 2003.
-
(2003)
Proc. Int'l Conf. Security in Pervasive Computing (SPC-2003)
-
-
Lee, R.B.1
Karig, D.K.2
McGregor, J.P.3
Shi, Z.4
-
55
-
-
85084164164
-
"Cyclone: A Safe Dialect of C"
-
June
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang, "Cyclone: A Safe Dialect of C," Proc. 2002 USENIX Ann. Technical Conf., pp. 275-288, June 2002.
-
(2002)
Proc. 2002 USENIX Ann. Technical Conf.
, pp. 275-288
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
56
-
-
33748513563
-
"Safe C Compiler (SCC)"
-
June
-
T. Austin, S. Breach, and G. Sohi, "Safe C Compiler (SCC)," http:// www.cs.wisc.edu/austin/scc.html, June 1994.
-
(1994)
-
-
Austin, T.1
Breach, S.2
Sohi, G.3
-
57
-
-
0036040304
-
"CCured: Type-Safe Retrofitting of Legacy Code"
-
Jan
-
G.C. Necula, S. McPeak, and W. Weimer, "CCured: Type-Safe Retrofitting of Legacy Code," Proc. ACM Symp. Principles of Programming Languages, pp. 128-139, Jan. 2002.
-
(2002)
Proc. ACM Symp. Principles of Programming Languages
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
58
-
-
0029200683
-
"Simultaneous Multi-threading: Maximizing On-Chip Parallelism"
-
June
-
D.M. Tullsen, S.J. Eggers, and H.M. Levy, "Simultaneous Multi-threading: Maximizing On-Chip Parallelism," Proc. 22nd Ann. Int'l Symp. Computer Architecture, pp. 392-403, June 1995.
-
(1995)
Proc. 22nd Ann. Int'l Symp. Computer Architecture
, pp. 392-403
-
-
Tullsen, D.M.1
Eggers, S.J.2
Levy, H.M.3
-
59
-
-
18744394459
-
"SimpleScalar LLC"
-
T. Austin, "SimpleScalar LLC," http://www.simplescalar.com/, 2001.
-
(2001)
-
-
Austin, T.1
-
60
-
-
33748501802
-
-
CERT Coordination Center, CERT Coordination Center Statistics 1988-2002
-
CERT Coordination Center, CERT Coordination Center Statistics 1988-2002, http://www.cert.org/stats/cert-stats.html, 2004.
-
(2004)
-
-
-
61
-
-
33748497181
-
-
CERT Coordination Center, CERT Coordination Center Incident and Vulnerability Trends
-
CERT Coordination Center, CERT Coordination Center Incident and Vulnerability Trends, http://www.cert.org/present/cert-overview-trends/, 2003.
-
(2003)
-
-
|