Midterm
Buffer Overflow: A Short Study
1 Buffer Overflows Nick Feamster CS 6262 Spring 2009 (credit to Vitaly S. from UT for slides)
PacSec2007: TOMOYO Linux: A Practical Method to Understand and Protect Your Own Linux Box
Ceh.v6. .module.16.hacking.webservers
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architect, Layer 7 Talk from Identity Management 2013
Software(runtime) attacks
Ceh v5 module 11 hacking webservers
Ethical hacking
Exploiting buffer overflows
Copyright © 2015 Pearson Education, Inc. Computer Fraud and Abuse Techniques Chapter 6 6-1.
© Adventium Labs, 2005 1 Course of Action Generation for Cyber Security Using Classical Planning Mark Boddy, Johnathan Gohde, Thomas Haigh, Steven Harp.