Skip to main content


CS 5434 - Defending Computer Networks - Fall 2013


# Author Title/Link
1 Aleph1 Smashing the Stack for Fun and Profit
2 Matt Connover w00w00 on heap overflows
3 Scut Exploiting Format String Vulnerabilities
4 Blexim Basic Integer Overflows
5 Mitre Common Weakness Enumeration
6 Steve Christey Unforgivable Vulnerabilities
7 Christey et al Structured CWE Descriptions
8 Cowan et al StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
9 Shacham et al On the Effectiveness of Address-Space Randomization
10 Hovav Shacham The Geometry of Innocent Flesh on the Bone
11 Jeff King ARP Poisoning Attack and Mitigation Techniques
12 Fyodor The Art of Port Scanning
13 Staniford et al Practical Automated Detection of Stealthy Portscans
14 Staniford et al How to 0wn the Internet in Your Spare Time.
15 Falliere et al W32.Stuxnet Dossier
15 Bellovin and Cheswick Network Firewalls
16 Paxson, V. An Analysis of Using Reflectors for Distributed Denial of Service Attacks.
17 Roesch, M. Snort – Lightweight Intrusion Detection for Networks.
18 Ptaceck and Newsham Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
19 Rain Forest Puppy A Look At Whisker's Anti-IDS Tactics
20 W3 Schools Javascript Tutorial
21 Stephen Bradshaw Heap Spray Exploit Tutorial: Internet Explorer Use After Free Aurora Vulnerability
22 US-CERT Understanding Malicious Content Mitigation for Web Developers
23 S. Fagerland et al Unveiling an Indian Cyberattack Infrastructure