Flylib.com
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194
Authors:
Mark Dowd
,
John McDonald
,
Justin Schuh
BUY ON AMAZON
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Table of Contents
Copyright
About the Authors
Preface
Acknowledgments
Part I: Introduction to Software Security Assessment
Chapter 1. Software Vulnerability Fundamentals
Introduction
Vulnerabilities
The Necessity of Auditing
Classifying Vulnerabilities
Common Threads
Summary
Chapter 2. Design Review
Introduction
Software Design Fundamentals
Enforcing Security Policy
Threat Modeling
Summary
Chapter 3. Operational Review
Introduction
Exposure
Web-Specific Considerations
Protective Measures
Summary
Chapter 4. Application Review Process
Introduction
Overview of the Application Review Process
Preassessment
Application Review
Documentation and Analysis
Reporting and Remediation Support
Code Navigation
Code-Auditing Strategies
Code-Auditing Tactics
Code Auditor s Toolbox
Case Study: OpenSSH
Summary
Part II: Software Vulnerabilities
Chapter 5. Memory Corruption
Introduction
Buffer Overflows
Shellcode
Protection Mechanisms
Assessing Memory Corruption Impact
Summary
Chapter 6. C Language Issues
Introduction
C Language Background
Data Storage Overview
Arithmetic Boundary Conditions
Type Conversions
Type Conversion Vulnerabilities
Operators
Pointer Arithmetic
Other C Nuances
Summary
Chapter 7. Program Building Blocks
Introduction
Auditing Variable Use
Auditing Control Flow
Auditing Functions
Auditing Memory Management
Summary
Chapter 8. Strings and Metacharacters
Introduction
C String Handling
Metacharacters
Common Metacharacter Formats
Metacharacter Filtering
Character Sets and Unicode
Summary
Chapter 9. UNIX I: Privileges and Files
Introduction
UNIX 101
Privilege Model
Privilege Vulnerabilities
File Security
File Internals
Links
Race Conditions
Temporary Files
The Stdio File Interface
Summary
Chapter 10. UNIX II: Processes
Introduction
Processes
Program Invocation
Process Attributes
Interprocess Communication
Remote Procedure Calls
Summary
Chapter 11. Windows I: Objects and the File System
Introduction
Background
Objects
Sessions
Security Descriptors
Processes and Threads
File Access
The Registry
Summary
Chapter 12. Windows II: Interprocess Communication
Introduction
Windows IPC Security
Window Messaging
Pipes
Mailslots
Remote Procedure Calls
COM
Summary
Chapter 13. Synchronization and State
Introduction
Synchronization Problems
Process Synchronization
Signals
Threads
Summary
Part III: Software Vulnerabilities in Practice
Chapter 14. Network Protocols
Introduction
Internet Protocol
User Datagram Protocol
Transmission Control Protocol
Summary
Chapter 15. Firewalls
Introduction
Overview of Firewalls
Stateless Firewalls
Simple Stateful Firewalls
Stateful Inspection Firewalls
Spoofing Attacks
Summary
Chapter 16. Network Application Protocols
Introduction
Auditing Application Protocols
Hypertext Transfer Protocol
Internet Security Association and Key Management Protocol
Abstract Syntax Notation (ASN.1)
Domain Name System
Summary
Chapter 17. Web Applications
Introduction
Web Technology Overview
HTTP
State and HTTP Authentication
Architecture
Problem Areas
Common Vulnerabilities
Harsh Realities of the Web
Auditing Strategy
Summary
Chapter 18. Web Technologies
Introduction
Web Services and Service-Oriented Architecture
Web Application Platforms
CGI
Perl
PHP
Java
ASP
ASP.NET
Summary
Bibliography
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194
Authors:
Mark Dowd
,
John McDonald
,
Justin Schuh
BUY ON AMAZON
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Using the IOS Filesystem for Images
Cable
Congestion Avoidance
A.1. IPv4 Subnetting
A.3. IPv6
Managing Enterprise Systems with the Windows Script Host
File Operations
Input/Output Streams
Registry Operations
Regular Expressions
Network Administration/WMI
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Credibility and Computers
Credibility and the World Wide Web
The Ethics of Persuasive Technology
Captology Looking Forward
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Getting to Know AutoCAD
Basic Commands to Get Started
Controlling Text in a Drawing
Using Layouts to Set Up a Print
Printing an AutoCAD Drawing
Junos Cookbook (Cookbooks (OReilly))
Activating the Router Configuration
Collecting Router Operational Information with SNMP
Tracking Router Configuration Changes
Creating a Chain of Routing Policies
Making Sure a Routing Policy Is Functioning Properly
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Value Stream Mapping and Process Flow Tools
Descriptive Statistics and Data Displays
Identifying and Verifying Causes
Selecting and Testing Solutions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies