|
英文參考文獻 [2] CERT Statistics http://www.cert.org/stats/ [3] National Vulnerability Database. http://nvd.nist.gov [4] Gerardo Richarte. “Four different tricks to bypass StackShield and StackGuard protection”, April 9, 2002 - June 3, 2002. [5] James C Foster. “Buffer Overflow Attacks - Detect, Exploit, Prevent”, April 6, 2006. [6] Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole. “Buffer Overflows: Attacks and Defenses for the vulnerability of the Decade” , DARPA Information Survivability Conference and Exposition 2000 Proceedings. [7] CERT® Advisory CA-2001-19. http://www.cert.org/advisories/CA-2001-19.html [8] CERT® Advisory CA-2003-04. http://www.cert.org/advisories/CA-2003-04.html [9] CERT® Advisory CA-2003-20. http://www.cert.org/advisories/CA-2003-20.html [10] Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang. “StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks”, Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29, 1998. [11] David A. Wheeler. “Secure Programming for Linux and Unix HOWTO”, 3 March 2003. [12] Purify: Fast Detection of Memory Leaks and Access Errors. In Proceedings of the Winter USENIX Conference, 1992. [13] Java.sun.com. http://java.sun.com/ [14] Crispin Cowan, Steve Beattie, John Johansen and Perry Wagle. “PointGuardTM: Protecting Pointers From Buffer Overflow Vulnerabilities”, Proceedings of the 12th USENIX Security Symposium, August 4–8, 2003. [15] Arash Baratloo, Timothy Tsai, and Navjot Singh. “Libsafe: Protecting Critical Elements of Stacks”, December 25, 1999. [16] Biswanath Mukherjee, L. Todd Heberlein, and Karl N. Levitt. “Network Intrusion Detection” , IEEE Network May/June 1994. [17] StackShield. http://www.angelfire.com/sk/stackshield/ [18] Thomas Toth and Christopher Kruegel. “Accurate Buffer Overflow Detection via Abstract Payload Execution” , Distributed Systems Group, Technical University of Vienna, 2002 [19] A. Pasupulati, J. Coit, K. Levitt. S. F. Wu. “Buttercup: On Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities”, IEEE 2004. [20] Stig Andersson, Andrew Clark, and George Mohay. “Network-Based Buffer Overflow Detection by Exploit Code Analysis”, Proceedings of AusCERT Asia Pacific Information Technology, 2004. [21] Zhenkai Liang and R. Sekar. “Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models” , Proceedings of the 21st Annual Computer Security Applications Conference, 2005. [22] Snort. http://www.snort.org [23] http://www.milw0rm.com/ [24] Solar Designer. Non-executable Stack Patch. http://www.openwall.com/linux [25] PaX. https://pageexec.virtualave.net [26] RSX. http://www.ihaquer.com/software/rsx. [27] kNoX. http://cliph.linux.pl/kNoX. [28] Austin TM, Breach SE, Sohi GS. Efficient detection of all pointer and array access errors. ACM SIGPLAN 94 Conference on Programming Language Design and Implementation. ACM: Orlando, FL, 1994;290-301 [29] Jones RWM, Kelly PHJ. Backwards-compatible bounds checking for arrays and pointers in C programs. Proceedings of the Third International Workshop on Automatic Debugging, Sweden, May 1997. Linkoeping University Electronic Press,13-26. [30] Hastings R, Joyce B. Purify: Fast detection of memory leaks and access errors. Proceedings of the Winter USENIX Conference. USENIX: San Jose, CA, 1992; 125-138 [31] Wagner D, Foster JS, Brewer EA, Aiken A. A first step towards automated detection of buffer overrun vulnerabilities. Network and Distributed System Security Symposium, San Diego, CA, February 2000; 3-17 [32] Larochelle D, Evans D. Statically detecting likely buffer overflow vulnerabilities. Proceedings of the 10th USENIX Security Symposium. USENIX: Washington, DC, 2001; 177-189 [33] Necula GC, McPeak S, Weimer W. CCured: Type-safe retrofitting of legacy code. 29th ACM Symposium on Principles of Programming Languages. ACM: Portland, OR, 2002; 128-139 [34] Jim T, Morrisett G, Grossman D, Hicks M, Cheney J, Wang Y. Cyclone: A safe dealect of C. USENIX Annual Technical Conference. USENIX: Monterey, CA, 2002. [36] http://www.die.net/doc/linux/man/man1/strace.1.html [37] Linux System Call Table: http://docs.cs.up.ac.za/programming/asm/derick_tut/syscalls.html [38] R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. Proceedings of the ACM SIGMOD Conference on Management of data, p.p. 207-216, May 1993. [39] R. Agrawal, and R. Srikant. Fast algorithms for mining association rules in large database. Technical Report FJ9839, IBM Almaden Research Center, San Jose, CA, Jun. 1994. [40] R. Agrawal, and R. Srikant. Fast algorithms for mining association rules. In Proc. 1994 Int. Conf. Very Large Databases(VLDB’94), Sep. 1994.
中文參考文獻 [1] 軟體王. http://www.softking.com.tw/ [35] 尹相志, SQL Server 2005 資料採礦聖經, 學貫, 2005, ISBN:9867198395
|