Secure Programming with Linux and Unix
Important debates about the Internet: fair use versus strong copyright rights; open access rules for broadband systems versus
free market modewww.ewalkins.com
Click Here To View Full Details
*******************************************************************
Meeting Critical Security Objectived with Security-Enhanced Linux
The theme of open and closed has run through many of the important debates about the
Internet: fair use versus strong copyright rights; open access rules for broadband systems versus
free market modwww.ewalkins.com
Click Here To View Full Details
*******************************************************************
Flaw in NTRU Signature Scheme
The second attack enables an opponent, given only the signer's public key and no
signatures at all, to forge an unlimited number of new signatures.www.ewalkins.com
Click Here To View Full Details
*******************************************************************
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operatingwww.ewalkins.com
systems are inadequate to support confidentiality
and integrity requirements for end systems. Mandatory
access control (MAC) is needed to address such requirements,www.ewalkins.com
Click Here To View Full Details
*******************************************************************
Countermeasures against Buffer Overflow Attacks
The purpose of this document is to examine to what extent automated tools can bewww.ewalkins.com
used to reduce the risk of buffer overflow vulnerabilities. We look at the possible
ways of dealing with buffer overflows, survey the existing tools and compare the
tradeoffs they make between security and efficiency.www.ewalkins.com
Click Here To View Full Details
*******************************************************************
UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes
www.ewalkins.com
Click Here To View Full Details
*******************************************************************
Attacks on and Countermeasures for USB Hardware Token Devices
This paper documents investigations into the mechanical, electrical, andwww.ewalkins.com
software design of multiple vendors' USB hardware tokens (Figure 1). The
main focus of the analysis is to access a legitimate user's private data on the
key without having the proper credentials.www.ewalkins.com
Click Here To View Full Details
*******************************************************************
Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge
This is a technical paper about kernel level vulnerabilities and their potential consequences forwww.ewalkins.com
security of operating systems. This subject will be however discussed in very specific context of
successful application of proof of concept code for such vulnerability during 5th Argus Hacking
Click Here To View Full Details
*******************************************************************
Strange Attractors and TCP/IP Sequence Number Analysis
Industry-leading software solutions mean superior business results. And better solutions depend on solid research. BindView's elite RAZOR team delivers the cutting edge in security research. In an ongoing commitment to superiority, RAZOR develops the vulnerability checks, best practices, and compliance algorithms behind BindView's solutionswww.ewalkins.com
Click Here To View Full Details
*******************************************************************
Non-executable Program Stack vulnerability
I've recently been playing around with bypassing the non-executable stack
protection that Solaris 2.6 provides. I'm referring to the mechanism that youwww.ewalkins.com
control with the noexec_user_stack option in /etc/system.
Click Here To View Full Details
*******************************************************************
Program Stack vulnerability
To understand what stack buffers are we must first understand how a
process is organized in memory. Processes are divided into three regions:
Text, Data, and Stack. We will concentrate on the stack region, but first
a small overview of the other regions is in order.www.ewalkins.com
Click Here To View Full Details
*******************************************************************
Reverse Compilation Techniques
www.ewalkins.com
Click Here To View Full Details
*******************************************************************
No comments:
Post a Comment