Check out the new USENIX Web site. next up previous
Next: Appendix 1: Benchmark Procedure Up: StackGhost: Hardware Facilitated Stack Previous: Acknowledgments

Bibliography

1
Aleph One.
``Smashing The Stack For Fun And Profit.''
Phrack, 7(49), November 1996.

2
Arash Baratloo, Timothy Tsai, and Navjot Singh.
``Transparent Run-Time Defense Against Stack Smashing Attacks.''
Proceedings of the USENIX Annual Technical Conference, June 2000.

3
C. F. Webb.
``Subroutine call/return stack.''
IBM Technical Disclosure Bulletin, 30(11), Apr. 1988.

4
Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle and Qian Zhang.
``StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,''
Proceedings of the 7th USENIX Security Conference, January 1998, San Antonio, TX.

5
Hiroaki Etoh.

``GCC extension for protecting applications from stack-smashing attacks.''
http://www.trl.ibm.co.jp/projects/security/ssp

6
Immunix.org.
``StackGuard Mechanism: Emsi's Vulnerability.''

http://immunix.org/StackGuard/ emsi_vuln.html.

7
Intel IA64 Architecture Software Developer's Manual.
``Volume 1: IA-64 Application Architecture Revision 1.1.'' July 2000

8
Intel IA64 Architecture Software Developer's Manual.
``Volume 2: IA-64 System Architecture Revision 1.1.'' July 2000

9
Intel IA64 Architecture Software Developer's Manual.
``Volume 3: IA-64 Instruction Set Reference Revision 1.1.'' July 2000

10
Intel IA64 Architecture Software Developer's Manual.
``Volume 4: IA-64 Itanium processor Programmar's Guide Revision 1.1.'' July 2000

11
Kevin Skadron, Pritpal S. Ahuja, Margaret Martonosi, Douglas W. Clark.
``Improving Prediction for Procedure Returns with Return-Address-Stack Repair Mechanisms.''
Proceedings of the 31st ACM/IEEE International Symposium on Microarchitecture, Nov 1998, Dallas TX.

12
Mudge.
``How to Write Buffer Overflows.''

http://l0pht.com/advisories/bufero.html, 1997.

13
Nathan P. Smith.
``Stack Smashing vulnerabilities in the UNIX Operating System.''

http://millcomm.com/~nate/machines/ security/stack-smashing/nate-buffer.ps, 1997.

14
PaX Team.
``NonExecutable Data Pages.''

http://pageexec.virtualave.net/pageexec.txt

15
S. McMahan. Cyrix Corp.
``Branch Processing unit with a return stack including repair using pointers from different pipe stages.''
U.S. Patent No. 5,706,491. Jan, 1998.

16
Solar Designer.
``NonExecutable User Stack.''

http://www.false.com/security/linux-stack/.

17
SPARC International, Inc.
``The SPARC Architecture Manual.'' Version 8. 1992.

18
Vendicator.
StackShield: A ``stack smashing'' technique protection tool for linux.

http://www.angelfire.com/sk/stackshield/.



2001-05-12