-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy paththesis.bib
338 lines (294 loc) · 13.9 KB
/
thesis.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
@inproceedings {MitMa,
author = {Thanh Bui and Siddharth Prakash Rao and Markku Antikainen and Viswanathan Manihatty Bojan and Tuomas Aura},
title = {Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer},
booktitle = {27th {USENIX} Security Symposium ({USENIX} Security 18)},
year = {2018},
isbn = {978-1-931971-46-1},
address = {Baltimore, MD},
pages = {1511--1525},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/bui},
publisher = {{USENIX} Association},
}
@misc{o'sullivan_2018, title={Facebook's worst hack ever could get worse}, note={https://www.cnn.com/2018/10/04/tech/facebook-hack-explainer/index.html}, journal={CNN}, author={O'Sullivan, Donie}, year={2018}, month={Oct}}
@misc{timberg_dwoskin_fung_2017, title={Data of 143 million Americans exposed in hack of credit reporting agency {Equifax}}, note={https://www.washingtonpost.com/business/technology/equifax-hack-hits-credit-histories-of-up-to-143-million-americans/2017/09/07/a4ae6f82-941a-11e7-b9bc-b2f7903bab0d\_story.html?noredirect=on\&utm\_term=.683f70071db7}, journal={The Washington Post}, author={Timberg, Craig and Dwoskin, Elizabeth and Fung, Brian}, year={2017}, month={Sep}}
@misc{google_transparency_report, title={{HTTPS} encryption on the web}, note={https://transparencyreport.google.com/ https/overview}, journal={Google Transparency Report}, author={Google}}
@misc{microsoft_developers_network_2018, title={Fast User Switching}, note={https:// docs.microsoft.com/en-us/windows/desktop/shell/fast-user-switching}, journal={Microsoft Docs}, publisher={Microsoft}, author={Kennedy, John and Satran, Michael}, year={2018}, month={May}}
@misc{russinovich_2018, title={Handle}, note={https://docs.microsoft.com/en-us/sysinternals/downloads/handle}, journal={Windows Sysinternals}, publisher={Microsoft}, author={Mark Russinovich}, year={2018}, month={Dec}}
@misc{microsoft_2018, title={Named Pipe Security and Access Rights}, note={https://docs.microsoft.com/en-us/windows/desktop/ipc/named-pipe-security-and-access-rights}, journal={Microsoft Docs}, author={Kennedy, John and Satran, Michael}, year={2018}, month={May}}
@misc{markruss_sharkey_2016, title={Pipelist}, note={https://docs.microsoft.com/en-us/sysinternals/downloads/pipelist}, journal={Windows Sysinternals}, publisher={Microsoft}, author={Markruss and Sharkey, Kent}, year={2016}, month={Jul}}
@inproceedings{cohen_2019, address={Las Vegas, NV}, title={Call the plumber: You have a leak in your (named) pipe}, booktitle={DEF CON 25}, author={Cohen, Gil}, year={2017}, month={Mar}}
@misc{watts2002discovering,
title={Discovering and exploiting named pipe security flaws for fun and profit},
author={Watts, Blake},
year={2002},
publisher={April},
note={http://www.blakewatts.com/namedpipepaper.html}
}
@inproceedings{Xing_2015_CAI_2810103_2813609,
author = {Xing, Luyi and Bai, Xiaolong and Li, Tongxin and Wang, XiaoFeng and Chen, Kai and Liao, Xiaojing and Hu, Shi-Min and Han, Xinhui},
title = {Cracking App Isolation on {Apple}: Unauthorized Cross-App Resource Access on {MAC OS X} and {iOS}},
booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security},
series = {CCS '15},
year = {2015},
isbn = {978-1-4503-3832-5},
location = {Denver, Colorado, USA},
pages = {31--43},
numpages = {13},
url = {http://doi.acm.org/10.1145/2810103.2813609},
doi = {10.1145/2810103.2813609},
acmid = {2813609},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {MACH-O, OS X, XARA, apple, attack, confuse deputy, cross-app resource access, iOS, program analysis, vulnerability},
}
@inproceedings{Shao_2016_MAU_2976749_2978297,
author = {Shao, Yuru and Ott, Jason and Jia, Yunhan Jack and Qian, Zhiyun and Mao, Z. Morley},
title = {The Misuse of {Android Unix} Domain Sockets and Security Implications},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
series = {CCS '16},
year = {2016},
isbn = {978-1-4503-4139-4},
location = {Vienna, Austria},
pages = {80--91},
numpages = {12},
url = {http://doi.acm.org/10.1145/2976749.2978297},
doi = {10.1145/2976749.2978297},
acmid = {2978297},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {android customization, application security, secure IPC},
}
@inproceedings{bojinov2010kamouflage,
title={Kamouflage: Loss-resistant password management},
author={Bojinov, Hristo and Bursztein, Elie and Boyen, Xavier and Boneh, Dan},
booktitle={European symposium on research in computer security},
pages={286--302},
year={2010},
organization={Springer}
}
@article{Scheifler:1986:XWS:22949.24053,
author = {Scheifler, Robert W. and Gettys, Jim},
title = {The {X Window} System},
journal = {ACM Trans. Graph.},
issue_date = {April 1986},
volume = {5},
number = {2},
month = apr,
year = {1986},
issn = {0730-0301},
pages = {79--109},
numpages = {31},
url = {http://doi.acm.org/10.1145/22949.24053},
doi = {10.1145/22949.24053},
acmid = {24053},
publisher = {ACM},
address = {New York, NY, USA},
}
@techreport{RFC0791,
author = {Jon Postel},
title = {Internet Protocol},
howpublished = {Internet Requests for Comments},
type = {STD},
number = {5},
year = {1981},
month = {September},
issn = {2070-1721},
publisher = {RFC Editor},
institution = {RFC Editor},
url = {http://www.rfc-editor.org/rfc/rfc791.txt},
note = {http://www.rfc-editor.org/rfc/rfc791.txt},
}
@techreport{RFC0793,
author = {Jon Postel},
title = {Transmission Control Protocol},
howpublished = {Internet Requests for Comments},
type = {STD},
number = {7},
year = {1981},
month = {September},
issn = {2070-1721},
publisher = {RFC Editor},
institution = {RFC Editor},
url = {http://www.rfc-editor.org/rfc/rfc793.txt},
note = {http://www.rfc-editor.org/rfc/rfc793.txt},
}
@book{Stevens:1996:TIT:233130,
author = {Stevens, W. Richard},
title = {TCP/IP Illustrated (Vol. 3): TCP for Transactions, HTTP, NNTP, and the Unix Domain Protocols},
year = {1996},
isbn = {0-201-63495-3},
publisher = {Addison Wesley Longman Publishing Co., Inc.},
address = {Redwood City, CA, USA},
}
@book{Stevens:1997:UNP:522800,
author = {Stevens, W. Richard},
title = {UNIX Network Programming: Networking APIs: Sockets and XTI},
year = {1997},
isbn = {013490012X},
edition = {2nd},
publisher = {Prentice Hall PTR},
address = {Upper Saddle River, NJ, USA},
}
@article{Xiurong2011TheAA,
title={The analysis and comparison of inter-process communication performance between computer nodes},
author={Xiurong, Zhang},
journal={Management Science and Engineering},
volume={5},
number={3},
pages={162},
year={2011},
publisher={Canadian Research \& Development Center of Sciences and Cultures}
}
@article{immich2003performance,
title={Performance analysis of five interprocess communication mechanisms across {UNIX} operating systems},
author={Immich, Patricia K and Bhagavatula, Ravi S and Pendse, Ravi},
journal={Journal of Systems and Software},
volume={68},
number={1},
pages={27--43},
year={2003},
publisher={Elsevier}
}
@misc{independent_security_evaluators_2019, title={Password Managers: Under the Hood of Secrets Management}, note={https://www.securityevaluators.com/casestudies/ password-manager-hacking/}, author={Independent Security Evaluators}, year={2019}, month={Feb}}
@inproceedings{chow2005shredding, title={Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation.}, author={Chow, Jim and Pfaff, Ben and Garfinkel, Tal and Rosenblum, Mendel}, booktitle={USENIX Security Symposium}, pages={22--22}, year={2005} }
@misc{langsec_language-theoretic_security, title={LangSec: Recognition, Validation, and Compositional Correctness for Real World Security}, note={http://langsec.org/bof-handout.pdf}, journal={LANGSEC: Language-theoretic Security}}
@book{fuzzing, title={Fuzzing: brute force vulnerability discovery}, author={Sutton, Michael and Greene, Adam and Amini, Pedram}, year={2007}, publisher={Pearson Education} }
@article{godefroid2012sage, title={{SAGE}: whitebox fuzzing for security testing},
author={Godefroid, Patrice and Levin, Michael Y and Molnar, David},
journal={Queue},
volume={10},
number={1}, pages={20}, year={2012}, publisher={ACM} }
@article{sassaman2011halting,
title={The halting problems of network stack insecurity},
author={Sassaman, Len and Patterson, Meredith L and Bratus, Sergey and Shubina, Anna},
journal={USENIX; login},
volume={36},
number={6},
pages={22--32},
year={2011}
}
@article{bratus2017parsing,
title={Curing the Vulnerable Parser: Design Patterns for Secure Input Handling},
author={Bratus, Sergey and Hermerschmidt, Lars and Hallberg, Sven M and Locasto, Michael E and Momot, Falcon D and Patterson, Meredith L and Shubina, Anna},
journal={USENIX; login},
volume={42},
number={1},
pages={32--39},
year={2017}
}
@inproceedings{johnson2004finding,
title={Finding User/Kernel Pointer Bugs with Type Inference.},
author={Johnson, Rob and Wagner, David},
booktitle={USENIX Security Symposium},
volume={2},
number={0},
year={2004}
}
@inproceedings{cowan2000buffer,
title={Buffer overflows: Attacks and defenses for the vulnerability of the decade},
author={Cowan, Crispin and Wagle, F and Pu, Calton and Beattie, Steve and Walpole, Jonathan},
booktitle={Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00},
volume={2},
pages={119--129},
year={2000},
organization={IEEE}
}
@article{one1996smashing,
title={Smashing the stack for fun and profit},
author={One, Aleph},
journal={Phrack magazine},
volume={7},
number={49},
pages={14--16},
year={1996}
}
@article{richarte2002four,
title={Four different tricks to bypass stackshield and stackguard protection},
author={Richarte, Gerardo and others},
journal={World Wide Web},
volume={1},
year={2002}
}
@inproceedings{shacham2007geometry,
title={The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).},
author={Shacham, Hovav and others},
booktitle={ACM conference on Computer and communications security},
pages={552--561},
year={2007},
organization={New York,}
}
@inproceedings{evtyushkin2016jump,
title={Jump over {ASLR}: Attacking branch predictors to bypass {ASLR}},
author={Evtyushkin, Dmitry and Ponomarev, Dmitry and Abu-Ghazaleh, Nael},
booktitle={The 49th Annual IEEE/ACM International Symposium on Microarchitecture},
pages={40},
year={2016},
organization={IEEE Press}
}
@misc{cve-2004-0597,
key = {CVE-2004-0597},
title = {{Multiple buffer overflows in libpng 1.2.5 and earlier}},
howpublished = {National Vulnerability Database},
institution = {NIST},
day = 23,
month = {November},
year = 2004,
note = {https://nvd.nist.gov/vuln/detail/CVE-2004-0597}
}
@misc{newsham_2000, title={Format String Attacks}, note={https://seclists.org/bugtraq/ 2000/Sep/214}, journal={bugtraq}, publisher={Guardent Inc.}, author={Newsham, Tim}, year={2000}, month={Sep}}
@article{sassaman2013security,
title={Security Applications of Formal Language Theory.},
author={Sassaman, Len and Patterson, Meredith L and Bratus, Sergey and Locasto, Michael E and Shubina, Anna},
journal={IEEE Systems Journal},
volume={7},
number={3},
pages={489--500},
year={2013}
}
@misc{scut2001exploiting,
title={Exploiting format string vulnerabilities},
author={scut / team teso},
year={2001},
month={March},
day={17},
note={http:// www.madchat.fr/coding/c/c.seku/format\_string/formatstring.pdf}
}
@misc{owasp_2018, title={OWASP Top 10 - The Ten Most Critical Web Application Security Risks}, note={https://www.owasp.org/images/7/72/OWASP\_Top\_10-2017\_(en).pdf.pdf}, author={OWASP}, year={2018}, month={Mar}}
@inproceedings{halfond2006classification,
title={A classification of {SQL}-injection attacks and countermeasures},
author={Halfond, William G and Viegas, Jeremy and Orso, Alessandro and others},
booktitle={Proceedings of the IEEE International Symposium on Secure Software Engineering},
volume={1},
pages={13--15},
year={2006},
organization={IEEE}
}
@misc{mehta_codenomicon_2014, title={The {Heartbleed} Bug}, note={http://heartbleed .com/}, journal={Heartbleed Bug}, author={Mehta, Neel and Codenomicon}, year={2014}, month={Apr}}
@inproceedings{Durumeric_2014_MH_2663716_2663755,
author = {Durumeric, Zakir and Li, Frank and Kasten, James and Amann, Johanna and Beekman, Jethro and Payer, Mathias and Weaver, Nicolas and Adrian, David and Paxson, Vern and Bailey, Michael and Halderman, J. Alex},
title = {The Matter of {Heartbleed}},
booktitle = {Proceedings of the 2014 Conference on Internet Measurement Conference},
series = {IMC '14},
year = {2014},
isbn = {978-1-4503-3213-2},
location = {Vancouver, BC, Canada},
pages = {475--488},
numpages = {14},
url = {http://doi.acm.org/10.1145/2663716.2663755},
doi = {10.1145/2663716.2663755},
acmid = {2663755},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {heartbleed, internet-wide scanning, openssl, security},
}
@book{mckusick_neville-neil_watson_2015, place={Upper Saddle River}, edition={2}, title={The design and implementation of the FreeBSD operating system}, publisher={Addison-Wesley/Pearson}, author={McKusick, Marshall Kirk. and Neville-Neil, George V. and Watson, Robert N. M.}, year={2015}}
@misc{apple_2005, title={Github Repository: darwin--xnu, Commit: xnu--792}, note={https:// github.com/apple/darwin-xnu/blob/master/bsd/kern/sys\_pipe.c}, journal={GitHub Repository}, author={Apple}, year={2005}, month={Apr}}
@book{singh2006mac,
title={Mac OS X internals: a systems approach},
author={Singh, Amit},
year={2006},
publisher={Addison-Wesley Professional}
}
@misc{radamsa, title={Radamsa}, author={Helin, Aki}, note={https://gitlab.com/akihe/radamsa}}
@misc{wireshark, title={Wireshark}, note={https://www.wireshark.org}}
@misc{socketSniffer, title={{Unix} Socket sniffer}, author={conrad}, note={http://graag.blogspot.com/2007/10/unix-socket-sniffer.html}}