Monday, June 23, 2008

Secure Programming with Linux and Unix

Important debates about the Internet: fair use versus strong copyright rights; open access rules for broadband systems versus
free market modewww.ewalkins.com

Click Here To View Full Details

*******************************************************************

Meeting Critical Security Objectived with Security-Enhanced Linux

The theme of open and closed has run through many of the important debates about the
Internet: fair use versus strong copyright rights; open access rules for broadband systems versus
free market modwww.ewalkins.com

Click Here To View Full Details

*******************************************************************
Flaw in NTRU Signature Scheme

The second attack enables an opponent, given only the signer's public key and no
signatures at all, to forge an unlimited number of new signatures.www.ewalkins.com

Click Here To View Full Details

*******************************************************************
Integrating Flexible Support for Security Policies into the Linux Operating System

The protection mechanisms of current mainstream operatingwww.ewalkins.com
systems are inadequate to support confidentiality
and integrity requirements for end systems. Mandatory
access control (MAC) is needed to address such requirements,www.ewalkins.com

Click Here To View Full Details

*******************************************************************

Countermeasures against Buffer Overflow Attacks

The purpose of this document is to examine to what extent automated tools can bewww.ewalkins.com
used to reduce the risk of buffer overflow vulnerabilities. We look at the possible
ways of dealing with buffer overflows, survey the existing tools and compare the
tradeoffs they make between security and efficiency.www.ewalkins.com

Click Here To View Full Details

*******************************************************************

UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes

www.ewalkins.com

Click Here To View Full Details

*******************************************************************
Attacks on and Countermeasures for USB Hardware Token Devices

This paper documents investigations into the mechanical, electrical, andwww.ewalkins.com
software design of multiple vendors' USB hardware tokens (Figure 1). The
main focus of the analysis is to access a legitimate user's private data on the
key without having the proper credentials.www.ewalkins.com

Click Here To View Full Details

*******************************************************************

Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge

This is a technical paper about kernel level vulnerabilities and their potential consequences forwww.ewalkins.com
security of operating systems. This subject will be however discussed in very specific context of
successful application of proof of concept code for such vulnerability during 5th Argus Hacking

Click Here To View Full Details

*******************************************************************

Strange Attractors and TCP/IP Sequence Number Analysis

Industry-leading software solutions mean superior business results. And better solutions depend on solid research. BindView's elite RAZOR team delivers the cutting edge in security research. In an ongoing commitment to superiority, RAZOR develops the vulnerability checks, best practices, and compliance algorithms behind BindView's solutionswww.ewalkins.com

Click Here To View Full Details

*******************************************************************
Non-executable Program Stack vulnerability

I've recently been playing around with bypassing the non-executable stack
protection that Solaris 2.6 provides. I'm referring to the mechanism that youwww.ewalkins.com
control with the noexec_user_stack option in /etc/system.

Click Here To View Full Details

*******************************************************************

Program Stack vulnerability

To understand what stack buffers are we must first understand how a
process is organized in memory. Processes are divided into three regions:
Text, Data, and Stack. We will concentrate on the stack region, but first
a small overview of the other regions is in order.www.ewalkins.com

Click Here To View Full Details

*******************************************************************
Reverse Compilation Techniques

www.ewalkins.com

Click Here To View Full Details

*******************************************************************

No comments: