Check out the new USENIX Web site. next up previous
Next: Appendix Up: Enhancements to the Linux Previous: Availability

Bibliography

AlephOne
Aleph One,Smashing The Stack For Fun And Profit, Phrack Mag., V. 7, N. 49, 1996.

Cowan
Cowan, C. et al., Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade, to appear as an invited talk at SANS 2000,
https://www.cse.ogi.edu/DISC/projects/immunix.

Conover
Conover, M. and the w00w00 Security Team, w00w00 on Heap Overflows,
https://www.w00w00.org/articles.html

Solar
Solar Designer, Non-Executable User Stack
https://www.openwall.com/linux

Wojtczuk
Wojtczuk R., Defeating Solar Designer Non-Executable Stack Patch, Bugtraq mailing list: January 30 1998.

StackGuard
StackGuard:
https://www.cse.ogi.edu/DISC/projects/immunix/StackGuard

Stevens
W.R. Stevens, Unix Network Programming, II edition, Prentice Hall 1998.

Comer
D. E. Comer and D. L. Stevens, Internetworking with TCP/IP Volume III, Prentice Hall 1998.

Goldberg
I. Goldberg, et al. ``A Secure Environment for Untrusted Helper Applications'', Proceedings of the USENIX 6th UNIX Security Symposium (1996).

Badger
L. Badger et al., ``A Domain and Type Enforcement UNIX Prototype'', Proceedings of the USENIX 5th UNIX Security Symposium (1995).

Bulba
Bulba and Kil3R, Bypassing StackGuard and Stackshield, Phrack Mag., V. 10, N. 56, 2000.

Bouchareine
P. Bouchareine, Format bugs, Bugtraq mailing list: July 18 2000.

Sekar
R. Sekar, T. Bowen and M. Segal, ``On Preventing Intrusions by Process Behavior Monitoring'', Proceedings of the USENIX Workshop on Intrusion Detection and Network Monitoring (ID '99).




2000-08-22