next up previous
Next: About this document ... Up: Protecting from stack-smashing attacks Previous: Conclusions

Bibliography

1
"Solar Designer". non-executable user stack.
http://www.false.com/security/linux/.

2
A. Baratloo, N. Singh, and T. Tsai.
Transparent Run-Time Defense Against Stack Smashing Attacks.
In Proceedings of the USENIX Annual Technical Conference, June 2000.

3
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, A. Grier, S. Beattie, P. Wagle, and Q. Zhang.
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
In Proceedings in the 7th USENIX Security Symposium, January 1998.

4
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer.
A secure environment for untrusted helper applications.
In Proceedings of the 6th USENIX Security Symposium, 1996.

5
R. Hastings and B. Joyce.
Purify: Fast Detection of Memory Leaks and Access Errors.
In Proceedings of the Winter USENIX Conference. 1992.

6
R. Jones and P. Kelly.
Bounds Checking for C.
http://www-ala.doc.ic.ac.uk/ phjk/BoundsChecking.html, July 1995.

7
Perlbench.
http://www.metacard.com/perlbench.html.

8
A. Snarskii.
FreeBSD stack integrity patch.
ftp://ftp.lucky.net/pub/unix/local/libc-letter, 1997.

9
"Vendicator".
Stack shield: A "stack smashing" technique protection tool for linux.
http://www.angelfire.com/sk/stackshield/.

10
J. Viega, J. Bloch, T. Khono, and G. McGraw.
ITS4: A static vulnerability scanner for C and C++ code.
In Proceeginds of ACSAC 2000, 2000.
To appear.



Etoh
2000-11-08