Security
Posted by Subash | 11:40 AM
[0] Comments
- Program Stack vulnerability [txt]
- Non-executable Program Stack vulnerability [txt]
- Strange Attractors and TCP/IP Sequence Number Analysis [link]
- Rainbow book series [link]
- Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]
- Attacks on and Countermeasures for USB Hardware Token Devices [pdf]
- UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]
- Countermeasures against Buffer Overflow Attacks [pdf]
- Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]
- Flaw in NTRU Signature Scheme (NSS) [pdf]
- Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]
- Secure Programming with Linux and Unix [pdf]
- Reverse Compilation Techniques [pdf]
- What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]
- Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]