Hacking - The Art of Exploitation, 2nd Edition

(Romina) #1
Conclusion 453

CNET News. “40-Bit Crypto Proves No Problem.” Online publication at


http://www.news.com/News/Item/0,4,7483,00.html


Conover, M. (Shok). “w00w00 on Heap Overflows.” Online publication at


http://www.w00w00.org/files/articles/heaptut.txt


Electronic Frontier Foundation. “Felten vs. RIAA.” Online publication at


http://www.eff.org/IP/DMCA/Felten_v_RIAA


Eller, R. (caezar). “Bypassing MSB Data Filters for Buffer Overflow Exploits


on Intel Platforms.” Online publication at http://community.core-sdi
.com/~juliano/bypass-msb.txt

Fluhrer, S., I. Mantin, and A. Shamir. “Weaknesses in the Key Scheduling


Algorithm of RC4.” Online publication at http://citeseer.ist.psu.edu/
fluhrer01weaknesses.html

Grover, L. “Quantum Mechanics Helps in Searching for a Needle in a


Haystack.” Physical Review Letters, vol. 79, no. 2 (1997), 325–28.


Joncheray, L. “Simple Active Attack Against TCP.” Online publication at


http://www.insecure.org/stf/iphijack.txt


Levy, S. Hackers: Heroes of the Computer Revolution. New York: Doubleday, 1984.


McCullagh, D. “Russian Adobe Hacker Busted,” Wired News, July 17, 2001.


Online publication at http://www.wired.com/news/politics/
0,1283,45298,00.html

The NASM Development Team. “NASM—The Netwide Assembler


(Manual),” version 0.98.34. Online publication at http://nasm
.sourceforge.net

Rieck, K. “Fuzzy Fingerprints: Attacking Vulnerabilities in the Human


Brain.” Online publication at http://freeworld.thc.org/papers/ffp.pdf


Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C,


2nd ed. New York: John Wiley & Sons, 1996.


Scut and Team Teso. “Exploiting Format String Vulnerabilities,” version 1.2.


Available online at private users’ websites.


Shor, P. “Polynomial-Time Algorithms for Prime Factorization and Discrete


Logarithms on a Quantum Computer.” SIAM Journal of Computing, vol. 26
(1997), 1484–509. Online publication at http://www.arxiv.org/abs/
quant-ph/9508027

Smith, N. “Stack Smashing Vulnerabilities in the UNIX Operating System.”


Available online at private users’ websites.


Solar Designer. “Getting Around Non-Executable Stack (and Fix).” BugTraq


post, August 10, 1997.


Stinson, D. Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, 1995.


Zwicky, E., S. Cooper, and D. Chapman. Building Internet Firewalls, 2nd ed.


Sebastopol, CA: O’Reilly, 2000.

Free download pdf