Skip to main content

 

CS 5434 - Defending Computer Networks - Fall 2015

 

# Author Title/Link
1 Aleph1 Smashing the Stack for Fun and Profit
2 Matt Connover w00w00 on heap overflows
3 Scut Exploiting Format String Vulnerabilities
4 Blexim Basic Integer Overflows
5 Mitre Common Weakness Enumeration
6 Steve Christey Unforgivable Vulnerabilities
7 Christey et al Structured CWE Descriptions
8 Cowan et al StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
9 Shacham et al On the Effectiveness of Address-Space Randomization
10 Hovav Shacham The Geometry of Innocent Flesh on the Bone
11 Jeff King ARP Poisoning Attack and Mitigation Techniques
12 Fyodor The Art of Port Scanning (You can skim the code section if time pressed)
13 Staniford et al Practical Automated Detection of Stealthy Portscans (Through section 3.1)
14 Staniford et al How to 0wn the Internet in Your Spare Time
15 Falliere et al. W32.Stuxnet Dossier
16 Bellovin and Cheswick Network Firewalls
17 Roesch, M. Snort – Lightweight Intrusion Detection for Networks
18 Ptacek and Newsham Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
19 Rain Forest Puppy A Look at Whisker’s Anti-IDS Tactics
20 W3 Schools Javascript Tutorial
21 Stephen Bradshaw Internet Explorer Aurora Vulnerability
22 US-CERT Understanding Malicious Content Mitigation for Web Developers