參考文獻 |
中文參考文獻
[1] 孫宇安,採用CPN方法偵測程式原始碼緩衝區溢位問題,中央大學資訊管理學系碩士論文,民國90年6月。
[2] 陳奕明、曾韵,彩色派翠網路在資訊安全上之應用實例-偵測緩衝區溢位漏洞,2002年網際網路工程研討會論文集,民國91年12月,中央研究院。
英文參考文獻
[3] CERT/CC Statistics 1988-2003, http://www.cert.org/stats/#vulnerabilities.
[4] webDav Buffer Overflow, http://www.net-security.org/advisory.php?id=1727.
[5] CERT Advisory CA-2003-12 Buffer Overflow in Sendmail, http://www.cert.org/advisories/CA-2003-12.html.
[6] A Buffer Overflow exists in Samba, http://packetstorm.widexs.nl/0304-advisories/Samba.txt.
[7] L.M. Bowman, “Companies on the Hook for Security,” http://news.com.com/2100-1023-821266.html, 2002.
[8] Microsoft Asks Colleges to Teach Hacking, http://www.pcworld.com/news/article/0,aid,109935,00.asp.
[9] Microsoft to let governments review Windows code , http://www.computerworld.com/securitytopics/security/story/0,10801,77599,00.html.
[10] Kurt Jensen, “Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use. Vol 1:Basic Concepts,” Monographs in Theoretical Computer Science, Spring-Verlag, 1992.
[11] DesignCPN website, http://www.daimi.au.dk/designCPN/man/.
[12] CPN Tools web site, http://wiki.daimi.au.dk:8000/cpntools/cpntools.wiki.
[13] J.Viega, J.T. Blosh, T. Kohno, and G. Mcgraw, ”ITS4:A Static Vulnerability Scanner for C and C++ Code,” In Proceedings of the 16th Annual Computer Security Applications Conference. New Orleans, Louisiana, December 2000.
[14] David Evans and David Larochelle, “Improving Security Using Extensible Lightweight Static Analysis,” IEEE Software Magazine, 2002.
[15] D. Larochelle and D. Evans, “Statically Detecting Likely Buffer Overflow Vulnerabilities,” In 2001 USENIX security symposium, Washington, D.C., 2001.
[16] D.Wagner, J. Foster, E. Brewer, and A. Aiken, “A first step towards automated detection of buffer overrun vulnerabilities,” Network and Distributed System Security Symposium, February 2000.
[17] Eric Haugh, and Matt Bishop, “Testing C Programs for Buffer Overflow Vulnerabilities,” Network and Distributed System Security Symposium, 2003.
[18] Nurit Dor, Michael Rodeh, and Mooly Sagiv, “Cleaness Checking of String Manipulations in C Programs via Integer Analysis,” In Proceedings of the Eight International Static Anlalysis Symposium, 2001.
[19] T. M. Austin, S. E. Breach, and G. S. Sohi, “Efficient Detection of All Pointer and Array Access Errors,” In the Proceedings of the ACM SIGPLAN ’94 Conference on Programming Language Design and Implementation, 1994.
[20] R. W. M. Jones and P. H. J. Kelly, “Backwards-compatible Bounds Checking for Arrays and Pointers in C programs,” Automated and Algorithmic Debugging, pages 13--26, 1997.
[21] A. Baraltoo, N. Singh, and T. Tsai, “Transparent Run-time Defense Against Stack Smashing Attacks,” In Proceedings of the USENIX Annual Technical Conference, 2000.
[22] A. K. Ghosh, T. O’Connor, and G.McGraw, “Analyzing Programs for Vulnerability to Buffer Overrun Attacks,” In Proceedings of the National Information Systems Security Conference, 1998.
[23] Crispin Cowan, Steve Beattie, Ryan Finnin Day, Calton Pu, Perry Wagle and Erik Walthinsen, “StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,” Proceedings in the 7th USENIX Security Symposium, 1998.
[24] Vendicator, “Stack Shield:A Stack Smashing Technique Protection Tool for Linux,” http://www.angelfire.com/sk/stackshield/ .
[25] “Solar Designer,” Non-executable User Stack, http://www.openwall.com/linux.
[26] Rough Auditing Tool for Security (Rats) website, http://www.securesw.com/rats/.
[27] ITS4 website, http://www.cigital.com/its4/.
[28] Splint website, http://splint.org/.
[29] BOON website, http://www.cs.berkeley.edu/~daw/boon/.
[30] Safe C compiler website, http://www.cs.wisc.edu/~austin/scc.html.
[31] StackGuard website, http://www.immunix.org/stackguard.html.
[32] Flowfinder website, http://www.dwheeler.com/flawfinder/.
[33] Aleph One, “Smashing the Stack for Fun and Profit,” http://www.shmoo.com/phrack/Phrack49/p49-14, 1996.
[34] John Wilander and Mariam Kamkar, “A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention,” Network and Distributed System Security Symposium, 2003.
[35] Susan His Yong, Susan Horwitz, and Thomas Reps, “Pointer Analysis for Programs with Structures and Casting,” In Proceeding of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 1999.
[36] Bjarne Steensgaard, “Points-to Analysis by Type Inference of Programs with Structures and Unions,” In Proceedings of the 1996 International Conference on Compiler Comstruction, 1996.
[37] Michael Siff, Staish Chandra, Thomas Ball, Krishna Kunchithapadam, and Thomas Reps, “Coping with Type Casts in C,” In Proceedings of ACM SIGSOFT Symposium on the Found of Software Engineering, 1999.
[38] John Viega and Gary MacGraw, “ Building Secure Software,” Addison Wesley, 2002.
[39] Nurit Dor, Michael Rodeh, and Mooly Sagiv, “CSSV:Towards a Realistic Tool for Statically Detecting All Buffer Overflows in C,” PLDI , 2003. |