Tα
σημαντικότερα Paper για το Buffer Overflow Exploit και τον εντοπισμό τους:
http://www.ultraviolet.org/mail-archives/bugtraq.2022/0553.html
Smashing The Stack For Fun And Profit
http://www.infosys.tuwien.ac.at/Staff/chris/
T.Toth, Christopher Kruegel, Ph.D.(PAPER)
Web Sites για την ασφάλεια υπολογιστικών
συστημάτων:
http://www.sans.org/top20/
SANS Top 20 Vulnerabilities - The Experts Consensus</A>
http://www.metasploit.com/
www.metasploit.com
http://www.infosys.tuwien.ac.at/Staff/tt/abstract_execution/index.html
Detecting Buffer Overflow Exploits in Requests via Abstract Payload Execution
http://community.core-sdi.com/~juliano/protec.html
Protecting Against Buffer Overflows
http://www.stsc.hill.af.mil/crosstalk/2001/01/mchugh.html
STSC CrossTalk - Intrusion Detection Implementation and Operational Issues
- Jan 2001
http://news.com.com/2100-1001-33483.html?legacy=cnet&tag=st.ne.1002.bgif%3fst.ne.fd.gif.l
Study says buffer overflow is most common security bug CNET News.com
http://www1.corest.com/common/showdoc.php?idx=221&idxseccion=10
DETECTION VULNERABILITIES
http://community.core-sdi.com/~juliano/
dc0ded – Περιέχει σχεδόν όλα τα άρθρα των Hackers που χετίζονται με τα
Buffer Overflow Exploits
http://www1.corest.com/common/showdoc.php?idx=221&idxseccion=10
CoreLabs -Advisories
http://www.computerworld.com/securitytopics/security/story/0,10801,
84510,00.html
Blaster worm linked to severity of blackout - Computerworld
http://www.insecure.org/sploits_microshit.html
Exploit world -- Microsoft Windows, WindowsNT, Windows98, Windows95, and
bloated programs secti
http://www.immunix.org/documentation.html
Immunix.org
The Source for Secure Linux Components and Platforms
http://www.cse.ogi.edu/DISC/projects/immunix/StackGuard/usenixsc98_html/
paper.html
StackGuard Automatic Adaptive Detection and Prevention of Buffer-Overflow
Attacks
http://webster.cs.ucr.edu/Page_AoALinux/HTML/AoATOC.html
The Art of Assembly
Language(THE BEST)
http://www.isacc.com/isacc2000/presentations/3c-vs/sld001.htm
Towards Certifying Software for Security
http://www.cee.hw.ac.uk/~alison/SysLevProg/t1/topic1.html
Your Compiled C Program Looking at the Assembly - NOTE
Θεωρία για τα λειτουργικά συστήματα
http://portal.acm.org/citation.cfm?id=173682.165159&coll=portal&dl=ACM&idx=
J89&part=newsletter&WantType=newsletter&title=ACM%20SIGARCH%20Computer
%20Architecture%20
News Citation
http://www.iecc.com/linker/linker10.html
Dynamic Linking and Loading
http://www.exposecorp.com/embedded/ex386.htm
Embedded 80386 Programming Examples-U
http://www.exposecorp.com/embedded/ex386.htm
Embedded 80386 Programming Examples
http://kernel.kaist.ac.kr/~jinsoo/course/cs330-2002spring/slides/supp-vm.pdf
http://www.amd.com/epd/processors/6.32bitproc/x21086/21086.pdf
http://www.netwinder.org/~scottb/notes/Elf-Design.html#toc4
NetWinder ELF Design Notes
http://www-106.ibm.com/developerworks/library/l-shobj/
Shared objects for the object disoriented
http://vx.netlux.org/texts/html/books/icz/tut4.html
Iczelion's Win32 Assembly Tutorial 4 Painting with Text
http://www.geocities.com/SiliconValley/Park/3230/x86asm/asmles00.html
Roby's PC Assembly Tutorial
Web Sites για τις μεθόδους επιθέσεων των Hackers
http://www.phrack.org/
PHRACK-MAGAZIN
http://packetstormsecurity.nl/
[packet storm]. - http--packetstormsecurity.org
http://www.garlic.com/~lynn/2002.html#23
2002 Newsgroup postings (1-1 - 1-12) Lynn Wheeler
http://www.cs.rice.edu/~scrosby/hash/
Algorithmic Complexity Attacks
http://webster.cs.ucr.edu/Page_AoALinux/0_AoAHLA.html
Art of Assembly Language Programming and HLA by Randall Hyde
http://www.asciitable.com/
Ascii Table - ASCII character codes and html, octal, hex and decimal charts
http://www.peterindia.com/AssemblyLanguage.html
Assembly Language Web Resources
http://www.iana.org/assignments/port-numbers
Assignments-PORT-Numbers
http://www.iro.umontreal.ca/~dift6221/bc_tutorial/tutorial/chapter4.htm
Behavioral Compiler Tutorial
http://www.is.titech.ac.jp/~wakita/classes/soft-2001/boflow-bib.pdf
BIBIOGRAFI REFf
http://www.isacc.com/isacc2000/presentations/3c-vs/sld026.htm
Buffer Overflow Detection
http://www.cs.unm.edu/~immsec/
Immune Systems - Main Page
http://gcc.gnu.org/
GCC Home Page - GNU Project - Free Software Foundation (FSF)
http://brand107.home.attbi.com/pc-gpe/intel.doc
http--brand107.home.attbi.com-pc-gpe-intel.doc
http://www-2.cs.cmu.edu/afs/cs.cmu.edu/academic/class/15213-f02/www/R04/section_c/R04-sectionC-4up.pdf
http://www.11a.nu/stack/adv.overflow.paper.txt
http://www.cs.fsu.edu/~engelen/courses/COP402001/notes7_4.pdf
http://linux.oreillynet.com/pub/a/linux/2003/06/02/snort.html?page=2
SNORT HOLES [Jun. 02, 2003]
http://www.kb.cert.org/vuls/id/823260
SOS Vulnerability Note VU#823260 BUFFER OVERFLOW
|