26.07.2018 Views

hacking-the-art-of-exploitation

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CNET News. “40-Bit Crypto Proves No Problem.” Online publication at<br />

http://www.news.com/News/Item/0,4,7483,00.html<br />

Conover, M. (Shok). “w00w00 on Heap Overflows.” Online publication at<br />

http://www.w00w00.org/files/<strong>art</strong>icles/heaptut.txt<br />

Electronic Frontier Foundation. “Felten vs. RIAA.” Online publication at<br />

http://www.eff.org/IP/DMCA/Felten_v_RIAA<br />

Eller, R. (caezar). “Bypassing MSB Data Filters for Buffer Overflow Exploits<br />

on Intel Platforms.” Online publication at http://community.core-sdi<br />

.com/~juliano/bypass-msb.txt<br />

Fluhrer, S., I. Mantin, and A. Shamir. “Weaknesses in <strong>the</strong> Key Scheduling<br />

Algorithm <strong>of</strong> RC4.” Online publication at http://citeseer.ist.psu.edu/<br />

fluhrer01weaknesses.html<br />

Grover, L. “Quantum Mechanics Helps in Searching for a Needle in a<br />

Haystack.” Physical Review Letters, vol. 79, no. 2 (1997), 325–28.<br />

Joncheray, L. “Simple Active Attack Against TCP.” Online publication at<br />

http://www.insecure.org/stf/iphijack.txt<br />

Levy, S. Hackers: Heroes <strong>of</strong> <strong>the</strong> Computer Revolution. New York: Doubleday, 1984.<br />

McCullagh, D. “Russian Adobe Hacker Busted,” Wired News, July 17, 2001.<br />

Online publication at http://www.wired.com/news/politics/<br />

0,1283,45298,00.html<br />

The NASM Development Team. “NASM—The Netwide Assembler<br />

(Manual),” version 0.98.34. Online publication at http://nasm<br />

.sourceforge.net<br />

Rieck, K. “Fuzzy Fingerprints: Attacking Vulnerabilities in <strong>the</strong> Human<br />

Brain.” Online publication at http://freeworld.thc.org/papers/ffp.pdf<br />

Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C,<br />

2nd ed. New York: John Wiley & Sons, 1996.<br />

Scut and Team Teso. “Exploiting Format String Vulnerabilities,” version 1.2.<br />

Available online at private users’ websites.<br />

Shor, P. “Polynomial-Time Algorithms for Prime Factorization and Discrete<br />

Logarithms on a Quantum Computer.” SIAM Journal <strong>of</strong> Computing, vol. 26<br />

(1997), 1484–509. Online publication at http://www.arxiv.org/abs/<br />

quant-ph/9508027<br />

Smith, N. “Stack Smashing Vulnerabilities in <strong>the</strong> UNIX Operating System.”<br />

Available online at private users’ websites.<br />

Solar Designer. “Getting Around Non-Executable Stack (and Fix).” BugTraq<br />

post, August 10, 1997.<br />

Stinson, D. Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, 1995.<br />

Zwicky, E., S. Cooper, and D. Chapman. Building Internet Firewalls, 2nd ed.<br />

Sebastopol, CA: O’Reilly, 2000.<br />

Conclusion 453

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!