"Fossies" - the Fresh Open Source Software Archive 
Member "libsafe-2.0-16/doc/whitepaper-2.0/whitepaper-20.bib" (6 Feb 2001, 2815 Bytes) of package /linux/misc/old/libsafe-2.0-16.tgz:
As a special service "Fossies" has tried to format the requested source page into HTML format using (guessed) BibTeX source code syntax highlighting (style:
standard) with prefixed line numbers.
Alternatively you can here
view or
download the uninterpreted source code file.
1 @InProceedings{SSP89*326,
2 author = "Mark W. Eichin and Jon A. Rochlis",
3 title = "With Microscope and Tweezers: An Analysis of the
4 Internet Virus of November 1988",
5 booktitle = "Proceedings of the 1989 {IEEE} Computer Society
6 Symposium on Security and Privacy ({SSP} '89)",
7 ISBN = "0-8186-1939-2",
8 year = 1989,
9 }
10
11 @Article{Rochlis89,
12 author = "Jon A. Rochlis and Mark W. Eichin",
13 title = "With Microscope and Tweezers: The Worm from {MIT}'s
14 Perspective",
15 journal = "Communications of the ACM",
16 month = jun,
17 year = 1989,
18 keywords = "Security",
19 }
20
21 @InProceedings{Seeley89,
22 author = "Donn Seeley",
23 title = "A Tour of the Worm",
24 booktitle = "Proceedings 1989 Winter USENIX Technical Conference",
25 month = jan # " 30 - " # feb # " 3",
26 year = 1989,
27 abstract = "{\bf Abstract:} On the evening of November 2, 1988, a
28 self-replicating program was released upon the
29 Internet. This program (a {\it worm}) invaded VAX and
30 Sun-3 computers running versions of Berkeley UNIX and
31 used their resources to attack still more computers.
32 Within the space of hours this program had spread
33 across the U.S., infecting hundreds or thousands of
34 computers and making many of them unusable due to the
35 burden of its activity. This paper provides a
36 chronology for the outbreak and presents a detailed
37 description of the internals of the worm, based on a C
38 version produced by decompiling.",
39 }
40
41 @Misc{bind_report,
42 key = {bind_report},
43 title = {BIND holes mean big trouble},
44 howpublished = {\url{http://securityfocus.com/frames/?content=/templates/article.html?id=144}}
45 }
46
47 @Misc{wuftpd_report,
48 key = {wuftpd_report},
49 title = {Wu-Ftpd Remote Format String Stack Overwrite Vulnerability},
50 howpublished = {\url{http://www.securityfocus.com/frames/?content=/vdb/bottom.html%3Fvid%3D1387}}
51 }
52
53 @InProceedings{usenix,
54 author = "Arash Baratloo and Timothy Tsai and Navjot Singh",
55 title = "Transparent Run-Time Defense Against Stack Smashing Attacks",
56 booktitle = "Proceedings of the {USENIX} Annual Technical Conference",
57 year = 2000,
58 month = jun
59 }
60
61 @InProceedings{stackguard98,
62 author = "Crispin Cowan and Calton Pu and Dave Maier and Heather
63 Hinton and Peat Bakke and Steve Beattie and Aaron Grier
64 and Perry Wagle and Qian Zhang",
65 title = {{StackGuard:} Automatic Adaptive Detection and Prevention
66 of Buffer-Overflow Attacks},
67 booktitle = {Proceedings of the 7th USENIX Security Conference},
68 year = 1998
69 }
70