|
[1]. C. Cowan, C. Pu, D. Maier, H. Hinton, J. Wadpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, "StackGuard: Automatic Detection and Prevention of Buffer-overrun Attacks", In Proceedings of the 7th USENIX Security Symposium, January 1998 [2]. Phrake Magazine, http://www.phrack.org [3]. Bulba and Kil3r lam3rz@hert.org, "Bypassing StackGuard and StackShield", volume 0xa Issue 0x38, 05.01.2000 [4]. Arash Baratloo, Navjot Singh, and Timothy Tsai. "Transparent run-time defense against stack smashing attacks". In Proceedings of the 2000 USENIX Annual Technical Conference (USENIX-00), pages 251–262, Berkeley, CA, June 2000. [5]. S. Bhatkar, D. DuVarney, and R. Sekar. "Address obfuscation: An efficient approach to combat a broad range of memory error exploits". In V. Paxson, editor, Proc. 12th USENIX Sec. Symp, USENIX, Aug. 2003. [6]. Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar, "Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits", Department of Computer Science, Stony Brook University, Stony Brook, NY 11794 [7]. The PaX Address Space Layout Randomization project, http://pax.grsecurity.net/ [8]. Tzi-cker Chiueh and Fu-Hau Hsu, "RAD: A Compiler Time Solution to Buffer Overflow Attacks", ICDCS 2001, Phoenix, Arizona, USA, April, 2001. [9]. H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. " On the effectiveness of address space randomization", derandomization attack, page 2. In Proc. of the ACM Conf. on Computer and Communications Security, 2004. [10]. Anonymous. "Bypassing PaX ASLR protection". Phrack, 11(59), July 2002. [11]. R. Jones and P. Kelly. "Bounds Checking for C". Technical report. http://www-ala.doc.ic.ac.uk/phjk/BoundsChecking.html [12]. D. Dhurjati and V. Adve. "Backwards-compatible array bounds checking for C with very low overhead". In Proc. 28th Int’l Conf. on Software Engineering (ICSE), Shanghai, China, May 2006. [13]. GCC extensions, http://gcc.gnu.org/extensions.html [14]. Exec Shield, http://en.wikipedia.org/wiki/Exec_Shield [15]. Crispin Cowan, Steve Beattie, John Johansen, and Perry Wagle. "Pointguard: Protecting pointers from buffer overflow vulnerabilities". In Proceedings of the 12th USENIX Security Symposium, Washington, D.C., August 2003. [16]. C. M. Linn, M. Rajagopalan, S. Baker, C. Collberg, and J. H. Hartman. "Protect against unexpected system calls". In Proceedings of the 2005 USENIX Security Symposium, page 239-254, July 2005. [17]. Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning. "Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software", IEEE Computer Society, 2006 [18]. The Apache Project, http://www.apache.org/ [19]. GDB: The GNU Project Debugger, http://sourceware.org/gdb/ [20]. G. S. Kc, A. D. Keromytis, and V. Prevelakis. "Countering Code-Injection Attacks With Instruction-Set Randomization". In Proceedings of the ACM Computer and Communications Security (CCS) Conference, pages 272–280, October 2003. [21]. BERNASCHI, M., GABRIELLI, E., AND MANCINI, L. V. 2002. "REMUS: a Security-Enhanced Operating System". ACM Transactions on Information and System Security 5, 36 (Feb.). [22]. QEMU: a generic and open source machine emulator and virtualizer, http://fabrice.bellard.free.fr/qemu/ [23]. VMware, http://www.vmware.com/ [24]. Strace: a system call tracer, http://sourceforge.net/projects/strace/ [25]. NX Bit, http://en.wikipedia.org/wiki/NX_bit [26]. Aleph One, "Smashing the Stack for Fun and Profit", Phrak 49
|