3A.Pasupulati,J.Coit,K.Leviu,S.F.Wu,S.H.Li,J.C.Ku0,K.P.Fan.Buttercup:On Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities[]..
4.Polymorphic Shellcodes vs.Application IDSs[].NGSEC White Paper.
二级参考文献18
1http://www. cert. org/stats/cert-stats. html
2Wagner D,Foster J S,Brewer E A,Aiken A. A first step towards automated detection of buffer overrun vulnerabilities. In:Proc. of Network and Distributed System Security Symposium, Catamaran Resort Hotel, San Diego, California, Feb. 20003.3~ 17
3Spaford E. The Interner Worm Program : Analysis Computer Communication Review, Jan. 1989.3-17
4DilDog. The tao of Windows buffer overflow. http://www. cultdeadcow. com/cDc-files/cDc-351/, April 1998
5Conover C, w00w00 Security Team. w00w00 on heap overflows.http://www. w00w00. org/files/articles/heaptut. txt, Jan. 1999
6Cowan C, et al. StackGuard: Automatic adaptive detection and prevention of buffer overflow attacks. In :Proc. of the 7th USENIX Security Conf. San Antonio, Texas, Jan. 1998.63-78
8Baratloo A,Singh N ,Tsai T. Libsafe: Protecting critical elements of stacks. White paper http://www. research. avayalabs. com/project/libsafe/, Dec. 1999
9Fetzer C,Xiao Z. Detecting heap smashing attacks through fault containment wrappers. In:the Proc. of the 20th symposium on Reliable Distributed Systems, Oct. 2001
10Viega J,Bloch J T, et al. ITS4:A static vlnerability scanner for C and C++ code. In: Proc. of the 16th Annual Computer Security Applications Conf. Dec. 2000