• Program Stack vulnerability [txt]
  • Non-executable Program Stack vulnerability [txt]
  • Strange Attractors and TCP/IP Sequence Number Analysis [link]
  • Rainbow book series [link]
  • Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]
  • Attacks on and Countermeasures for USB Hardware Token Devices [pdf]
  • UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]
  • Countermeasures against Buffer Overflow Attacks [pdf]
  • Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]
  • Flaw in NTRU Signature Scheme (NSS) [pdf]
  • Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]
  • Secure Programming with Linux and Unix [pdf]
  • Reverse Compilation Techniques [pdf]
  • What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]
  • Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]

Comments (0)

Add a Comment