# |
Author |
Title/Link |
1 |
Aleph1 |
Smashing the Stack for Fun and Profit |
2 |
Matt Connover |
w00w00 on heap overflows |
3 |
Scut |
Exploiting Format String Vulnerabilities |
4 |
Blexim |
Basic Integer Overflows |
5 |
Mitre |
Common Weakness Enumeration |
6 |
Steve Christey |
Unforgivable Vulnerabilities |
7 |
Christey et al |
Structured CWE Descriptions |
8 |
Cowan et al |
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks |
9 |
Shacham et al |
On the Effectiveness of Address-Space Randomization |
10 |
Hovav Shacham |
The Geometry of Innocent Flesh on the Bone |
11 |
Jeff King |
ARP Poisoning Attack and Mitigation Techniques |
12 |
Fyodor |
The Art of Port Scanning |
13 |
Staniford et al |
Practical Automated Detection of Stealthy Portscans |
14 |
Staniford et al |
How to 0wn the Internet in Your Spare Time. |
15 |
Falliere et al |
W32.Stuxnet Dossier |
15 |
Bellovin and Cheswick |
Network Firewalls |
16 |
Paxson, V. |
An Analysis of Using Reflectors for Distributed Denial of Service Attacks. |
17 |
Roesch, M. |
Snort – Lightweight Intrusion Detection for Networks. |
18 |
Ptaceck and Newsham |
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection |
19 |
Rain Forest Puppy |
A Look At Whisker's Anti-IDS Tactics |
20 |
W3 Schools |
Javascript Tutorial |
21 |
Stephen Bradshaw |
Heap Spray Exploit Tutorial: Internet Explorer Use After Free Aurora Vulnerability |
22 |
US-CERT |
Understanding Malicious Content Mitigation for Web Developers |
23 |
S. Fagerland et al |
Unveiling an Indian Cyberattack Infrastructure |