ΒΙΒΛΙΟΓΡΑΦΙΑ

 

Tα σημαντικότερα Paper για το Buffer Overflow Exploit και τον εντοπισμό τους:

http://www.ultraviolet.org/mail-archives/bugtraq.2022/0553.html
Smashing The Stack For Fun And Profit

http://www.infosys.tuwien.ac.at/Staff/chris/

T.Toth, Christopher Kruegel, Ph.D.(PAPER)

Web Sites για την ασφάλεια υπολογιστικών συστημάτων:

http://www.sans.org/top20/
SANS Top 20 Vulnerabilities - The Experts Consensus</A>

http://www.metasploit.com/
www.metasploit.com

http://www.infosys.tuwien.ac.at/Staff/tt/abstract_execution/index.html
Detecting Buffer Overflow Exploits in Requests via Abstract Payload Execution

http://community.core-sdi.com/~juliano/protec.html
Protecting Against Buffer Overflows

http://www.stsc.hill.af.mil/crosstalk/2001/01/mchugh.html
STSC CrossTalk - Intrusion Detection Implementation and Operational Issues - Jan 2001

http://news.com.com/2100-1001-33483.html?legacy=cnet&tag=st.ne.1002.bgif%3fst.ne.fd.gif.l
Study says buffer overflow is most common security bug CNET News.com

http://www1.corest.com/common/showdoc.php?idx=221&idxseccion=10

DETECTION VULNERABILITIES

http://community.core-sdi.com/~juliano/
dc0ded – Περιέχει σχεδόν όλα τα άρθρα των Hackers που χετίζονται με τα Buffer Overflow Exploits

http://www1.corest.com/common/showdoc.php?idx=221&idxseccion=10
CoreLabs -Advisories

http://www.computerworld.com/securitytopics/security/story/0,10801,
84510,00.html

Blaster worm linked to severity of blackout - Computerworld

http://www.insecure.org/sploits_microshit.html
Exploit world -- Microsoft Windows, WindowsNT, Windows98, Windows95, and bloated programs secti

http://www.immunix.org/documentation.html Immunix.org
The Source for Secure Linux Components and Platforms

http://www.cse.ogi.edu/DISC/projects/immunix/StackGuard/usenixsc98_html/
paper.html

StackGuard Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks

http://webster.cs.ucr.edu/Page_AoALinux/HTML/AoATOC.html The Art of Assembly
Language(THE BEST)

http://www.isacc.com/isacc2000/presentations/3c-vs/sld001.htm

Towards Certifying Software for Security

http://www.cee.hw.ac.uk/~alison/SysLevProg/t1/topic1.html
Your Compiled C Program Looking at the Assembly - NOTE

Θεωρία για τα λειτουργικά συστήματα

http://portal.acm.org/citation.cfm?id=173682.165159&coll=portal&dl=ACM&idx=
J89&part=newsletter&WantType=newsletter&title=ACM%20SIGARCH%20Computer
%20Architecture%20

News Citation

http://www.iecc.com/linker/linker10.html
Dynamic Linking and Loading

http://www.exposecorp.com/embedded/ex386.htm
Embedded 80386 Programming Examples-U

http://www.exposecorp.com/embedded/ex386.htm
Embedded 80386 Programming Examples

http://kernel.kaist.ac.kr/~jinsoo/course/cs330-2002spring/slides/supp-vm.pdf

http://www.amd.com/epd/processors/6.32bitproc/x21086/21086.pdf
http://www.netwinder.org/~scottb/notes/Elf-Design.html#toc4
NetWinder ELF Design Notes

http://www-106.ibm.com/developerworks/library/l-shobj/

Shared objects for the object disoriented

http://vx.netlux.org/texts/html/books/icz/tut4.html
Iczelion's Win32 Assembly Tutorial 4 Painting with Text

http://www.geocities.com/SiliconValley/Park/3230/x86asm/asmles00.html
Roby's PC Assembly Tutorial

Web Sites για τις μεθόδους επιθέσεων των Hackers

http://www.phrack.org/
PHRACK-MAGAZIN

http://packetstormsecurity.nl/
[packet storm]. - http--packetstormsecurity.org

http://www.garlic.com/~lynn/2002.html#23
2002 Newsgroup postings (1-1 - 1-12) Lynn Wheeler

http://www.cs.rice.edu/~scrosby/hash/
Algorithmic Complexity Attacks

http://webster.cs.ucr.edu/Page_AoALinux/0_AoAHLA.html

Art of Assembly Language Programming and HLA by Randall Hyde

http://www.asciitable.com/

Ascii Table - ASCII character codes and html, octal, hex and decimal charts

http://www.peterindia.com/AssemblyLanguage.html

Assembly Language Web Resources

http://www.iana.org/assignments/port-numbers
Assignments-PORT-Numbers

http://www.iro.umontreal.ca/~dift6221/bc_tutorial/tutorial/chapter4.htm
Behavioral Compiler Tutorial

http://www.is.titech.ac.jp/~wakita/classes/soft-2001/boflow-bib.pdf
BIBIOGRAFI REFf

http://www.isacc.com/isacc2000/presentations/3c-vs/sld026.htm
Buffer Overflow Detection

http://www.cs.unm.edu/~immsec/
Immune Systems - Main Page

http://gcc.gnu.org/
GCC Home Page - GNU Project - Free Software Foundation (FSF)

http://brand107.home.attbi.com/pc-gpe/intel.doc
http--brand107.home.attbi.com-pc-gpe-intel.doc

http://www-2.cs.cmu.edu/afs/cs.cmu.edu/academic/class/15213-f02/www/R04/section_c/R04-sectionC-4up.pdf
http://www.11a.nu/stack/adv.overflow.paper.txt
http://www.cs.fsu.edu/~engelen/courses/COP402001/notes7_4.pdf
http://linux.oreillynet.com/pub/a/linux/2003/06/02/snort.html?page=2
SNORT HOLES [Jun. 02, 2003]

http://www.kb.cert.org/vuls/id/823260
SOS Vulnerability Note VU#823260 BUFFER OVERFLOW


Copyright © 2004
Powered by Internet Systematics Lab