Next: A. Proof of Theorem
Up: Detecting Format String Vulnerabilities
Previous: Acknowledgments
-
- 1
-
Martín Abadi and Luca Cardelli.
A Theory of Objects.
Springer, 1996.
- 2
- Lamagra Argamal.
``ftpd: the advisory version.''
bugtraq mailing list, 23 June 2000.
https://www.securityfocus.comarchive166544.
- 3
-
Todd M. Austin, Scott E. Breach, and Gurindar S. Sohi.
``Efficient Detection of All Pointer and Array Access Errors.''
In Proceedings of the ACM SIGPLAN '94 Conference on Programming
Language Design and Implementation, June 1994.
- 4
-
Christophe Bailleux. ``Asynchro,''
bugtraq mailing list, 8 December 2000.
https://www.securityfocus.comarchive1149977.
- 5
- D.J. Bernstein,
``Re: Logging question.''
qmail
mailing list, 13 September 1996.
https://www.ornl.govitsarchivesmailing-listsqmail199612msg00314.html.
- 6
- K. J. Biba.
``Integrity considerations for secure computer systems.''
Technical Report ESD-TR-76-372, MTR-3153,
The MITRE Corporation, USAF Electronic Systems Division,
Bedford, MA, April 1977.
- 7
- M. Bishop and M. Dilger.
``Checking for Race Conditions in File Accesses.''
Computing Systems, 9(2):131-152,
Spring 1996.
- 8
- CERT Advisory CA-2000-13.
``Two Input Validation Problems in FTPD.''
7 July 2000.
- 9
- CERT Advisory CA-2000-17,
``Input Validation Problem in rpc.statd.''
18 August 2000.
- 10
- CERT Incident Note IN-2000-10,
``Widespread Exploitation of rpc.statd and wu-ftpd Vulnerabilities.''
15 September 2000.
- 11
-
CERT Advisory CA-2000-22. ``Input Validation Problems in LPRng.''
12 December 2000.
- 12
- Satish Chandra and Thomas W. Reps.
``Physical Type Checking for C.''
In Proceedings of the ACM SIGPLAN/SIGSOFT Workshop on Program Analysis
for Software Tools and Engineering, Toulouse, France, September 1999.
, pages 66-75.
- 13
-
Crispin Cowan, Matt Barringer, Steve Beattie,
Greg Kroah-Hartman, Mike Frantzen, and Jamie Lokier.
``FormatGuard: Automatic Protection From printf Format
String Vulnerabilities.''
This volume.
- 14
-
B. A. Davey and H. A. Priestley.
Introduction to Lattices and Order.
Cambridge University Press, 1990.
- 15
-
Alan DeKok. ``PScan: A limited problem scanner for C source files.''
Available at https://www.striker.ottawa.on.ca~aland
pscan.
- 16
-
Martin Elsman, Jeffrey S. Foster, and Alexander Aiken. ``Carillon--a
System to Find Y2K Problems in C Programs.'' Available at
https://www.cs.berkeley.eduResearchAikencarillondoc.ps.gz.
- 17
-
Dawson Engler, Benjamin Chelf, Andy Chou, and Seth Hallem. ``Checking
System Rules Using System-Specific, Programmer-Written Compiler
Extensions.'' In Proceedings of the Fourth Symposium on Operating
Systems Design and Implementation, San Diego, CA, October 2000.
- 18
-
David Evans.
``Static Detection of Dynamic Memory Errors.''
Proceedings of the 1996 ACM SIGPLAN Conference on
Programming Language Design and Implementation, Philadelphia,
Pennsylvania, May 1996, pages 44-53.
- 19
-
Jeffrey S. Foster, Manuel Fähndrich, and Alexander Aiken. ``A
Theory of Type Qualifiers.'' In ACM SIGPLAN Conference on Programming
Language Design and Implementation (PLDI'99), Atlanta, Georgia, May
1999.
- 20
- Christopher Harrelson. ``Program Analysis Mode.'' https://www.cs.berkeley.edu~chrishtrpam.
- 21
- Fritz Henglein and Jakob Rehof.
``The Complexity of Subtype Entailment for Simple Types.''
In Proceedings, Twelfth Annual IEEE Symposium on Logic
in Computer Science, Warsaw, Poland, July 1997, pages 352-361.
- 22
- Maxime Henrion. ``muh IRC bouncer remote
vulnerability.'' FreeBSD Security Advisory FreeBSD-SA-00:57.
http:/www.securityfocus.comadvisories2741.
- 23
- Maxime Henrion.
``format string bug in muh.''
bugtraq mailing list, 09 September 2000.
https://www.securityfocus.comarchive181367.
- 24
-
Jarno Huuskonen.
``Some possible format string errors.''
Linux Security Audit Project mailing list, 25 September 2000.
https://www2.merton.ox.ac.uk~securitysecurity-audit-2000090118.html.
- 25
- Jarno Huuskonen.
``syslog(prio, buf) in mars_nwe.''
Linux Security Audit Project mailing list, 27 September 2000.
https://www2.merton.ox.ac.uk~securitysecurity-audit-2000090136.html.
- 26
-
K. Rustan M. Leino and Greg Nelson. ``An Extended Static Checker for
Modula-3.'' In Kai Koskimies, editor, Compiler Construction: 7th
International Conference, CC'98, volume 1383 of Lecture Notes in
Computer Science, pages 302-305. Springer, April 1998.
- 27
-
Robert Lemos. ``Internet worm squirms into Linux servers.''
Special to CNET News.com, 17 January 2001.
https://news.cnet.comnews0-1003-200-4508359.html.
- 28
-
John C. Mitchell.
Type inference with simple subtypes.
Journal of Functional Programming, 1(3):245-285, July 1991.
- 29
-
Andrew C. Myers and Barbara Liskov.
``Protecting Privacy using the Decentralized Label Model.''
ACM Transactions on Software Engineering and Methodology,
9(4), April 2001.
- 30
-
Tim Newsham. ``Format String Attacks.'' Guardent, Inc. September
2000. https://www.guardent.comdocsFormatString.PDF.
- 31
-
Robert O'Callahan and Daniel Jackson. ``Lackwit: Practical Program
Understanding With Type Inference.''
In Proceedings of the 19th International Conference on
Software Engineering, pp. 338-348, Boston, Massachusetts, May 1997.
- 32
-
Perl Security. https://www.perl.compubdocmanualhtmlpodperlsec.html.
- 33
- Jakob Rehof and Manuel Fähndrich.
``Type-Based Flow Analysis: From Polymorphic Subtyping to
CFL-Reachability.''
In Proceedings of the 28th Annual
ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages,
London, United Kingdom, January 2001.
- 34
- Tim J. Robbins. libformat. Available at
https://box3n.gumbynet.org~fyresoftware.
- 35
- Pekka Savola.
``Very probable remote root vulnerability in cfengine.''
bugtraq mailing list, 1 October 2000.
https://www.securityfocus.comarchive1136751.
- 36
-
Michael Siff, Satish Chandra, Thomas Ball, Thomas Reps,
and Krishna Kunchithapadam.
``Coping With Type Casts in C.'' In ACM Conference
on Foundations of Software Engineering (FSE), September 1999.
- 37
- Bjarne Steensgaard.
``Points-to Analysis in Almost Linear Time.''
In Proceedings of the 23rd Annual ACM SIGPLAN-SIGACT Symposium on
Principles of Programming Languages, St. Petersburg Beach, Florida,
January 1996, pages 32-41.
- 38
-
John Viega, J.T. Bloch, Tadayoshi Kohno, and Gary McGraw. ``ITS4: A
Static Vulnerability Scanner for C and C++ Code.'' In
16th Annual Computer Security Applications Conference (ACSAC 2000),
December 2000.
- 39
-
D. Volpano, G. Smith, and C. Irvine.
``A sound type system for secure flow analysis.''
Journal of Computer Security,
4(3):1-21, 1996.
- 40
-
D. Volpano and G. Smith.
``A type-based approach to program security.''
Proceedings of TAPSOFT'97,
Colloqium on Formal Approaches in Software Engineering.
- 41
-
David Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander
Aiken. ``A First Step Toward Automated Detection of Buffer Overrun
Vulnerabilities.'' In Proceedings of the Network and Distributed
System Security Symposium, San Diego, California, February 2000.
- 42
-
Larry Wall, Tom Christiansen and Jon Orwant.
Programming Perl, 3rd Edition. July 2000. O'Reilly & Associates.
- 43
- ``WuFTPD: Providing &sstarf#star;remote&sstarf#star; root since at
least 1994,'' bugtraq mailing list, June 23, 2000,
https://www.securityfocus.comarchive166367.
Umesh Shankar
2001-05-16