"Fossies" - the Fresh Open Source Software Archive

Member "libsafe-2.0-16/doc/whitepaper-2.0/whitepaper-20.bib" (6 Feb 2001, 2815 Bytes) of package /linux/misc/old/libsafe-2.0-16.tgz:


As a special service "Fossies" has tried to format the requested source page into HTML format using (guessed) BibTeX source code syntax highlighting (style: standard) with prefixed line numbers. Alternatively you can here view or download the uninterpreted source code file.

    1 @InProceedings{SSP89*326,
    2   author =       "Mark W. Eichin and Jon A. Rochlis",
    3   title =        "With Microscope and Tweezers: An Analysis of the
    4                  Internet Virus of November 1988",
    5   booktitle =    "Proceedings of the 1989 {IEEE} Computer Society
    6                  Symposium on Security and Privacy ({SSP} '89)",
    7   ISBN =         "0-8186-1939-2",
    8   year =         1989,
    9 }
   10 
   11 @Article{Rochlis89,
   12   author =       "Jon A. Rochlis and Mark W. Eichin",
   13   title =        "With Microscope and Tweezers: The Worm from {MIT}'s
   14                  Perspective",
   15   journal =      "Communications of the ACM",
   16   month =        jun,
   17   year =         1989,
   18   keywords =     "Security",
   19 }
   20 
   21 @InProceedings{Seeley89,
   22   author =       "Donn Seeley",
   23   title =        "A Tour of the Worm",
   24   booktitle =    "Proceedings 1989 Winter USENIX Technical Conference",
   25   month =        jan # " 30 - " # feb # " 3",
   26   year =         1989,
   27   abstract =     "{\bf Abstract:} On the evening of November 2, 1988, a
   28                  self-replicating program was released upon the
   29                  Internet. This program (a {\it worm}) invaded VAX and
   30                  Sun-3 computers running versions of Berkeley UNIX and
   31                  used their resources to attack still more computers.
   32                  Within the space of hours this program had spread
   33                  across the U.S., infecting hundreds or thousands of
   34                  computers and making many of them unusable due to the
   35                  burden of its activity. This paper provides a
   36                  chronology for the outbreak and presents a detailed
   37                  description of the internals of the worm, based on a C
   38                  version produced by decompiling.",
   39 }
   40 
   41 @Misc{bind_report,
   42   key =      {bind_report},
   43   title =    {BIND holes mean big trouble},
   44   howpublished = {\url{http://securityfocus.com/frames/?content=/templates/article.html?id=144}}
   45 }
   46 
   47 @Misc{wuftpd_report,
   48   key =      {wuftpd_report},
   49   title =    {Wu-Ftpd Remote Format String Stack Overwrite Vulnerability},
   50   howpublished = {\url{http://www.securityfocus.com/frames/?content=/vdb/bottom.html%3Fvid%3D1387}}
   51 }
   52 
   53 @InProceedings{usenix,
   54   author =       "Arash Baratloo and Timothy Tsai and Navjot Singh",
   55   title =        "Transparent Run-Time Defense Against Stack Smashing Attacks",
   56   booktitle =    "Proceedings of the {USENIX} Annual Technical Conference",
   57   year =         2000,
   58   month =    jun
   59 }
   60 
   61 @InProceedings{stackguard98,
   62   author    = "Crispin Cowan and Calton Pu and Dave Maier and Heather
   63             Hinton and Peat Bakke and Steve Beattie and Aaron Grier
   64             and Perry Wagle and Qian Zhang",
   65   title = {{StackGuard:} Automatic Adaptive Detection and Prevention
   66   of Buffer-Overflow Attacks},
   67   booktitle =    {Proceedings of the 7th USENIX Security Conference},
   68   year =     1998
   69 }
   70