U



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

UDP (User Datagram Protocol) 2nd
     header validation
     stateful firewalls
     stateless firewalls
UIDs (user IDs), UNIX 2nd
UML (Unified Markup Language)
     class diagrams
     component diagrams
     use cases
UN*X
unary + operator, C programming language
unary operator, C programming language
unary operator, C programming language
unbounded copies, strings
unbounded string functions
UNC (Universal Naming Convetion), redirector
unconstrained data types, test cases, code audits
undefined behavior, C programming language
underflow, unsigned integers
Understand source code navigator
Unexpected Return Values listing (7-29)
Unicode
     character equivalence
     code page assumptions
     decoding
     homographic attacks
     NUL-termination
     UTF-16 encoding
     UTF-8 encoding
     Windows functions
Unicos
Unified Markup Language (UML) [See UML (Unified Markup Language).]
Uniform Resource Identifiers (URIs)
Uninformed magazine
Uninitialized Memory Buffer listing (7-7)
Uninitialized Object Attributes listing (7-8)
Uninitialized Variable Usage listing (7-6)
unique creation, UNIX temporary files
unititialized memory buffers
unititialized object attributes
unititialized variable usage
UNIX
     BSD
         securelevels
     controlling terminals
     daemons
     directories
         creating
         entries
         Filesystem Hierarchy Standard
         mount points
         parent directories
         permissions
         public directories
         root directories
         safety
         working directories
     domain sockets 2nd
     environment variables
     file descriptors 2nd
     file IDs
     file security
     files 2nd 3rd
         boot files
         creating
         desciprtors
         device files
         directories
         filenames
         inodes
         kernel files
         libraries
         links
         log files
         named pipes
         pathnames
         paths
         permissions
         personal user files
         proc file system
         program configuration files
         program files
         race conditions
         sharing
         stdio file interface
         system configuration files
         temporary files
     GECOS field
     groups
         effective groups
         GIDs
         GIDs (group IDs)
         login groups
         primary groups
         real groups
         saved set groups
         secondary groups
         setgid (set-group-id)
         supplemental groups 2nd
     kernel
     Linux
         capabilities
         file system IDs
     mail spools
     naming of
     O_EXCL flag
     open( ) system call
     origins of
     password files
     pipes
     POSIX standards
     privileges
         dropping permanently 2nd
         dropping temporarily
         extensions
         group ID functions
         management code audits
         programs
         user ID functions
         vunerabilities
     processes 2nd
         attributes
         child processes
         children
         creating
         environment arrays
         fork( ) system call
         groups
         interprocess communication
         open( ) function
         program invocation
         RPCs (Remote Procedure Calls)
         sessions
         system file table
         terminals
         termination
     program invocation
         direct invocation
         indirect invocation
     resource limits
    RPCs (Remote Procedure Calls)
         authentication
         decoding routines
         definition files
     shadow password files
     shell histories
     shell login scripts
     shell logon scripts
     System V-IPC mechanisms
     tools
     UN*X
     users
         effective users
         home directories
         real users
         saved set users
         setuid (set-user-id)
         shells
         superusers
         UIDs (user IDs) 2nd
unlink( ) function 2nd
UNLOCK method
unmask attribute, UNIX
unmask file permissions
unnecessary services
Unsigned Comparison Vulnerability listing (6-22)
unsigned integer types, C programming language
Unsigned Integer Underflow Example listing (6-4)
unsigned integers
     boundaries 2nd
     conversions
         vunerabilities
     narrowing
     numeric overflow
     numeric underflow
     widening
unsigned-preserving promotions
untrustworthy credentials, authentication
Upgrade header field (HTTP)
uploading files, security
URG flags, TCP (Transmission Control Protocol)
URI header field (HTTP)
URIs (Uniform Resource Identifiers)
     script URI
URLs, embedding state in
use cases, UML (Unified Markup Language)
use scenarios
uselib( ) function
User Datagram Protocol (UDP)
user IDs (UIDs), UNIX
     functions
User-Agent header field (HTTP)
users, UNIX
     effective users
     file security
     home directories
     privilege vunerabilities
     real users
     saved set users
     setuid (set-user-id)
     shells
     superusers
     UIDs (userIDs)
     user ID functions
     user IDs (UIDs)
usual arithmetic conversions 2nd 3rd
UTF-16 encoding
UTF-8 encoding
utilitiy functions, HTTP (Hypertext Transfer Protocol)




The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net