參考文獻 |
[1] Crispin Cowan, “Re: Buffer overflow and OS/390,” Posting to Bugtraq, February 1999.
[2] Eugene H. Spafford, “The Internet Worm Program: An Analysis, ”Purdue Technical Report, CSD-TR-823, November 1988.
[3] Common Vulnerabilities and Exposures (CVE)
http://cve.mitre.org/
[4] Solar Designer, “Getting around non-executable stack (and fix),” Posting to Bugtraq, August 1997.
[5] Hovav Shacham, “The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86),” 14th ACM Conference on Computer and Communications Security, October 2007.
[6] The Source for Java Developers
http://java.sun.com/
[7] Visual C#
http://msdn.microsoft.com/en-us/library/kx37x362.aspx
[8] TIOBE Programming Community Index
http://www.tiobe.com/tiobe_index/index.htm
[9] Arash Baratloo, Timothy Tsai and Navjot Singh, “Libsafe:Protecting Critical Elements of Stacks,” Bell Labs, Lucent Technologies, December 1999.
[10] Emre C. Sezer, Peng Ning, Chongkyung Kil, and Jun Xu, “MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities,” 14th ACM Conference on Computer and Communications Security, October 2007.
[11] Crispin Cowan, “StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,” 7th USENIX Security Symposium, January 1998.
[12] GCC, the GNU Compiler Collection,
http://gcc.gnu.org/
[13] Hiroaki Etoh, “GCC extension for protecting applications from stack-smashing attacks,”
取自http://www.research.ibm.com/trl/projects/security/ssp/
[14] Microsoft Windows, “/GS (Buffer Security Check),”
取自http://msdn.microsoft.com/en-us/library/8dbf701c(VS.80).aspx
[15] Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti, “Control-Flow Integrity: Principles, Implementations, and Applications,” 12th ACM Conference on Computer and Communications Security, November 2005.
[16] Periklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, and Miguel Castro, “Preventing memory error exploits with WIT,” 2008 IEEE Symposium on Security and Privacy, May 2008.
[17] Wietse Venema, “Isolation Mechanisms for Commodity Applications and Platforms,” IBM Research Report, RC24725, January 2009.
[18] PaX project, “address space layout randomization,” PaX project, March 2003,
取自http://pax.grsecurity.net/docs/aslr.txt
[19] Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh, “On the Effectiveness of Address-Space Randomization,” 11th ACM Conference on Computer and Communications Security, October 2004.
[20] Ollie Whitehouse, “An Analysis of Address Space Layout Randomization on Windows Vista,” Symantec Advanced Threat Research, 2007.
[21] Hagen Fritsch, “Buffer overflows on linux-x86-64,” BlackHat Europe, April 2009.
[22] PaX project, “segmentation based non-executable pages,” PaX project, May 2003,
取自http://pax.grsecurity.net/docs/segmexec.txt
[23] Arjan van de Ven, “New Security Enhancements in Red Hat Enterprise Linux v.3, update 3,” Red Hat, Inc., August 2004.
[24] OpenBSD 3.3 Release,
取自http://www.openbsd.org/33.html
[25] Microsoft Windows,“Data Execution Prevention,”
取自http://technet.microsoft.com/en-us/library/cc738483(WS.10).aspx
[26] Zhenkai Liang and R. Sekar, “Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models,” 2005 Annual Computer Security Applications Conference, December 2005.
[27] Steven A. Hofmeyr, Stephanie Forrest, and Anil Somayaji, “Intrusion Detection using Sequences of System Calls,” Journal of Computer Security archive, Volume 6, Issue 3, August 1998.
[28] Robert Wahbe, Steven Lucco, Thomas E. Anderson, and Susan L. Graham, “Efficient software-based fault isolation,” 14th ACM Symposium on Operating Systems Principles, December 1995.
[29] The gzip home page
http://www.gzip.org/
|