Table of Contents
Previous Section Next Section


1. Bruce McCorkendale and Peter Szor , "CodeRed Buffer Overflow," Virus Bulletin, September 2001,

2. Frederic Perriot and Peter Szor , "An Analysis of the Slapper Worm Exploit,"

3. Frederic Perriot and Peter Szor , "Slamdunk: An Analysis of Slammer Worm," Virus Bulletin, March 2003,

4. David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, Nicholas Weaver , "The Spread of the Sapphire/Slammer Worm,"

5. Mark Kennedy , "Script-Based Mobile Threats," Virus Bulletin, 2000, pp. 335355.

6. Peter Ferrie , "Sobig, Sobigger, Sobiggest," Virus Bulletin, October 2003, pp. 5-10.

7. Eugene Spafford , "The Internet Worm Program: An Analysis," 1988,

8. Peat Bakke, Steve Beattie, Crispan Cowan, Aaron Grier, Heather Hinton, Dave Maier, Oregon Graduate Institute of Science & Technology, Calton Pu , Ryerson Polytechnic University, Perry Wagle, Jonathan Walpole, and Qian Zhang , "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," 7th USENIX Security Symposium,

9. Elias Levy , "Smashing the Stack for Fun and Profit," Phrack 49.

10. Eric Chien and Peter Szor , "Blended Attacks," Virus Bulletin, 2002,

11. Michael Howard and David LeBlanc , "Writing Secure Code," Microsoft Press, 2003.

12. Hiroaki Etoh , "ProPolice,"

13. Matt Conover and the w00w00 Security Team, "w00w00 on Heap Overflows,"

14. Libsafe,

15. PaX Team,

16. SecureStack,

17. Vladimir Kiriansky, Derek Bruening, and Saman Amarasinghe , "Secure Execution via Program Shepherding," 11th USENIX Security Symposium, August 2002.

18. Derek Bruening, Evelyn Duesterwald, and Saman Amarasinghe , "Design and Implementation of a Dynamic Optimization Framework for Windows," 4th ACM Workshop on Feedback-Directed and Dynamic Optimization (FDDO-4), 2001.

19. David Litchfield , "Unauthenticated Remote Compromise in MS SQL Server 2000,"

20. Hobbit , "Netcat,"

21. Frederic Perriot, Peter Ferrie, and Peter Szor , "Blast Off!," Virus Bulletin, September 2003,

22. Peter Ferrie, Frederic Perriot, and Peter Szor , "Chiba Witty Blues," Virus Bulletin, May 2004, pp. 9-10.

23. Matthew Williamson , "Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code,"

24. Mikko Hyppönen , "RetrovirusesHow Viruses Fight Back," Virus Bulletin, 1994,

25. Vern Paxson, Stuart Staniford, and Nicholas Weaver , "How to 0wn the Internet in Your Spare Time,"

26. Dr. Frederick B. Cohen , A Short Course on Computer Viruses, Wiley Professonal Computing, 2nd Edition, New York, 1994, ISBN: 0471007684.

27. "Executable Disable Bit Functionality Blocks Malware Code Execution,"

28. Ivan Arce , "The Shellcode Generation," IEEE, Security & Privacy, September/October 2004, Volume 2, Number 5, pp. 7276.

    Table of Contents
    Previous Section Next Section