 
 
 
 
 
 
   
 Next: Appendix 1: Benchmark Procedure
 Up: StackGhost: Hardware Facilitated Stack
 Previous: Acknowledgments
 
- 1
- 
      Aleph One.
      
 ``Smashing The Stack For Fun And Profit.''
 Phrack, 7(49), November 1996.
 
- 2
- 
       Arash Baratloo, Timothy Tsai, and Navjot Singh.
       
 ``Transparent Run-Time Defense Against Stack Smashing
                   Attacks.''
 Proceedings of the USENIX Annual Technical Conference,
                  June 2000.
 
- 3
- 
       C. F. Webb.
       
 ``Subroutine call/return stack.''
 IBM Technical Disclosure Bulletin, 30(11), Apr. 1988.
 
- 4
- 
      Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton,
      Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier,
      Perry Wagle and Qian Zhang.
      
 ``StackGuard: Automatic Adaptive Detection and
                Prevention of Buffer-Overflow Attacks,''
 Proceedings of the 7th USENIX Security Conference,
                     January 1998, San Antonio, TX.
 
- 5
- 
      Hiroaki Etoh.
 
 ``GCC extension for protecting applications from
                  stack-smashing attacks.''
 https://www.trl.ibm.co.jp/projects/security/ssp
 
- 6
- 
      Immunix.org.
      
 ``StackGuard Mechanism: Emsi's Vulnerability.''
 
 https://immunix.org/StackGuard/ emsi_vuln.html.
 
- 7
- 
      Intel IA64 Architecture Software Developer's Manual.
      
 ``Volume 1: IA-64 Application Architecture Revision 1.1.''
                July 2000
 
- 8
- 
      Intel IA64 Architecture Software Developer's Manual.
      
 ``Volume 2: IA-64 System Architecture Revision 1.1.''
                July 2000
 
- 9
- 
      Intel IA64 Architecture Software Developer's Manual.
      
 ``Volume 3: IA-64 Instruction Set Reference Revision 1.1.''
                July 2000
 
- 10
- 
      Intel IA64 Architecture Software Developer's Manual.
      
 ``Volume 4: IA-64 Itanium processor Programmar's Guide
                Revision 1.1.'' July 2000
 
- 11
- 
      Kevin Skadron, Pritpal S. Ahuja, Margaret Martonosi, Douglas W. Clark.
      
 ``Improving Prediction for Procedure Returns with
                  Return-Address-Stack Repair Mechanisms.''
 Proceedings of the 31st ACM/IEEE International
                  Symposium on Microarchitecture, Nov 1998, Dallas TX.
 
- 12
- 
      Mudge.
      
 ``How to Write Buffer Overflows.''
 
 https://l0pht.com/advisories/bufero.html, 1997.
 
- 13
- 
       Nathan P. Smith.
       
 ``Stack Smashing vulnerabilities in the
                   UNIX Operating System.''
 
 https://millcomm.com/~nate/machines/ security/stack-smashing/nate-buffer.ps, 1997.
 
- 14
- 
      PaX Team.
      
 ``NonExecutable Data Pages.''
 
 https://pageexec.virtualave.net/pageexec.txt
 
- 15
- 
      S. McMahan. Cyrix Corp.
      
 ``Branch Processing unit with a return stack including
                  repair using pointers from different pipe stages.''
 U.S. Patent No. 5,706,491. Jan, 1998.
 
- 16
- 
      Solar Designer.
      
 ``NonExecutable User Stack.''
 
 https://www.false.com/security/linux-stack/.
 
- 17
- 
      SPARC International, Inc.
      
 ``The SPARC Architecture Manual.'' Version 8. 1992.
 
- 18
- 
      Vendicator.
      
 StackShield: A ``stack smashing'' technique protection
                tool for linux.
 
 https://www.angelfire.com/sk/stackshield/.
 
2001-05-12