Next: Appendix 1: Benchmark Procedure
 Up: StackGhost: Hardware Facilitated Stack
 Previous: Acknowledgments
 
- 1
 - 
      Aleph One.
      
``Smashing The Stack For Fun And Profit.''
      
Phrack, 7(49), November 1996.
 - 2
 - 
       Arash Baratloo, Timothy Tsai, and Navjot Singh.
       
``Transparent Run-Time Defense Against Stack Smashing
                   Attacks.''
       
Proceedings of the USENIX Annual Technical Conference,
                  June 2000.
 - 3
 - 
       C. F. Webb.
       
``Subroutine call/return stack.''
       
IBM Technical Disclosure Bulletin, 30(11), Apr. 1988.
 - 4
 - 
      Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton,
      Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier,
      Perry Wagle and Qian Zhang.
      
``StackGuard: Automatic Adaptive Detection and
                Prevention of Buffer-Overflow Attacks,''
      
Proceedings of the 7th USENIX Security Conference,
                     January 1998, San Antonio, TX.
 - 5
 - 
      Hiroaki Etoh.
      
``GCC extension for protecting applications from
                  stack-smashing attacks.''
      
http://www.trl.ibm.co.jp/projects/security/ssp
 - 6
 - 
      Immunix.org.
      
``StackGuard Mechanism: Emsi's Vulnerability.''
      
http://immunix.org/StackGuard/ emsi_vuln.html.
 - 7
 - 
      Intel IA64 Architecture Software Developer's Manual.
      
``Volume 1: IA-64 Application Architecture Revision 1.1.''
                July 2000
 - 8
 - 
      Intel IA64 Architecture Software Developer's Manual.
      
``Volume 2: IA-64 System Architecture Revision 1.1.''
                July 2000
 - 9
 - 
      Intel IA64 Architecture Software Developer's Manual.
      
``Volume 3: IA-64 Instruction Set Reference Revision 1.1.''
                July 2000
 - 10
 - 
      Intel IA64 Architecture Software Developer's Manual.
      
``Volume 4: IA-64 Itanium processor Programmar's Guide
                Revision 1.1.'' July 2000
 - 11
 - 
      Kevin Skadron, Pritpal S. Ahuja, Margaret Martonosi, Douglas W. Clark.
      
``Improving Prediction for Procedure Returns with
                  Return-Address-Stack Repair Mechanisms.''
      
Proceedings of the 31st ACM/IEEE International
                  Symposium on Microarchitecture, Nov 1998, Dallas TX.
 - 12
 - 
      Mudge.
      
``How to Write Buffer Overflows.''
      
http://l0pht.com/advisories/bufero.html, 1997.
 - 13
 - 
       Nathan P. Smith.
       
``Stack Smashing vulnerabilities in the
                   UNIX Operating System.''
       
http://millcomm.com/~nate/machines/ security/stack-smashing/nate-buffer.ps, 1997.
 - 14
 - 
      PaX Team.
      
``NonExecutable Data Pages.''
      
http://pageexec.virtualave.net/pageexec.txt
 - 15
 - 
      S. McMahan. Cyrix Corp.
      
``Branch Processing unit with a return stack including
                  repair using pointers from different pipe stages.''
      
U.S. Patent No. 5,706,491. Jan, 1998.
 - 16
 - 
      Solar Designer.
      
``NonExecutable User Stack.''
      
http://www.false.com/security/linux-stack/.
 - 17
 - 
      SPARC International, Inc.
      
``The SPARC Architecture Manual.'' Version 8. 1992.
 - 18
 - 
      Vendicator.
      
StackShield: A ``stack smashing'' technique protection
                tool for linux.
      
http://www.angelfire.com/sk/stackshield/.
 
2001-05-12