Next: Appendix
Up: Enhancements to the Linux
Previous: Availability
-
- AlephOne
- Aleph One,Smashing The Stack For Fun And Profit, Phrack Mag., V. 7, N. 49, 1996.
- Cowan
- Cowan, C. et al., Buffer Overflows: Attacks
and Defenses for the Vulnerability of the Decade, to appear as an
invited talk at SANS 2000,
https://www.cse.ogi.edu/DISC/projects/immunix.
- Conover
- Conover, M. and the w00w00 Security Team, w00w00 on Heap Overflows,
https://www.w00w00.org/articles.html
- Solar
- Solar Designer, Non-Executable User Stack
https://www.openwall.com/linux
- Wojtczuk
- Wojtczuk R., Defeating Solar Designer Non-Executable Stack Patch, Bugtraq mailing list: January 30 1998.
- StackGuard
- StackGuard:
https://www.cse.ogi.edu/DISC/projects/immunix/StackGuard
- Stevens
- W.R. Stevens, Unix Network Programming, II edition, Prentice Hall 1998.
- Comer
- D. E. Comer and D. L. Stevens,
Internetworking with TCP/IP Volume III, Prentice Hall 1998.
- Goldberg
- I. Goldberg, et al.
``A Secure Environment for Untrusted Helper Applications'', Proceedings of the USENIX 6th UNIX Security Symposium (1996).
- Badger
- L. Badger et al., ``A Domain and Type Enforcement UNIX Prototype'',
Proceedings of the USENIX 5th UNIX Security Symposium (1995).
- Bulba
- Bulba and Kil3R, Bypassing StackGuard and Stackshield, Phrack Mag., V. 10, N. 56, 2000.
- Bouchareine
- P. Bouchareine, Format bugs, Bugtraq mailing list: July 18 2000.
- Sekar
- R. Sekar, T. Bowen and M. Segal,
``On Preventing Intrusions by Process Behavior Monitoring'',
Proceedings of the USENIX Workshop on Intrusion Detection and Network
Monitoring (ID '99).
2000-08-22