• "Buffer Underruns, DEP, ASLR and Improving the Exploitation Prevention Mechanisms (XPMs) on the Windows Platform." September 30, 2005.

  • "CERT Advisory CA-2001-19 'Code Red' Worm Exploiting Buffer Overflow in IIS Indexing Service DLL."

  • "Exploiting Format String Vulnerabilities."

  • "Format String Attack." Web Application Security Consortium.

  • "Format String Problem." OWASP.

  • Bishop, Matt and David Bailey. "A Critical Analysis of Vulnerability Taxonomies." CSE-96-11, September 1996.

  • blexim. " Basic Integer Overflows ." Phrack . Issue 60, Chapter 10.

  • Christey, Steve. "Off-by-One Errors: A Brief Explanation." Secprog and SC-L mailing list posts, May 5, 2004

  • Flake, Halvar. "Third Generation Exploits." Presentation at Black Hat Europe 2001. ake.ppt

  • Franz, Matt. "Fuzzing wiki."

  • Howard, Michael. "Reviewing Code for Integer Manipulation Vulnerabilities."

  • Howard, Michael. "When Scrubbing Secrets in Memory Doesn't Work." Bugtraq, November 5, 2002.

  • McGraw, Gary and Greg Hoglund. Exploiting Software: How to Break Code . Boston: Addison Wesley, 2004

  • Newsham, Tim. "Format String Attacks." Guardent. September 2000.

  • PLOVER. Mitre.

  • Wagner, Joseph. "GNU GCC: Optimizer Removes Code Necessary for Security." Bugtraq, November 16, 2002.

Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: