Bibliography

[biblio12_01] (Miller, Fredriksen, and So 1990) Miller,BartonP., LarsFredriksen, and BryanSo. “An Empirical Study of the Reliability of UNIX Utilities,” http://citeseer.ist.psu.edu/miller90empirical.html.

[biblio12_02] (Miller et al. 1995) Miller,BartonP., DavidKoski, CjinPheowLee, VivekanandaMaganty, RaviMurthy, AjitkumarNatarajan, and JeffSteidl. “Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services,” http://citeseer.ist.psu.edu/miller95fuzz.html.

[biblio12_03] (Miller 2005) Miller,BartonP. “Fuzz Testing of Application Reliability,” http://www.cs.wisc.edu/~bart/fuzz/fuzz.html. December, 2005.

[biblio12_04] (Gallagher, Jeffries, and Landauer 2006) Gallagher,Tom, BryanJeffries, and LawrenceLandauer. Finding Security Bugs. Redmond, WA: Microsoft Press, 2006.

[biblio12_05] (Microsoft 2006a) Microsoft Corporation. “GDI+,” http://msdn.microsoft.com/library/en-us/gdicpp/gdiplus/gdiplus.asp. MSDN, 2006.

[biblio12_06] (Still 2002) Still, Michael, IBM Corporation. “Graphics programming with libtiff,” http://www-128.ibm.com/developerworks/linux/library/l-libtiff/. developerWorks, 2002.

[biblio12_07] (van Sprundel 2005) vanSprundelmIlja. “Fuzzing,” http://static.23.nu/md/Pictures/FUZZING.PDF.

[biblio12_08] (Sutton and Greene 2005) Sutton,Michael, and AdamGreene, iDEFENSE Labs. Black Hat 2005, “The Art of File Format Fuzzing,” http://www.blackhat.com/presentations/bh-jp-05/bh-jp-05-sutton-greene.pdf. July 2005.

[biblio12_09] (Oehlert 2005) Oehlert,Peter. “Violating Assumptions with Fuzzing,” IEEE Security and Privacy, March/April 2005.

[biblio12_10] (Milano 1999) Milano,John. Compressed Image File Formats. Boston, MA: Addison-Wesley, 1999.

[biblio12_11] (Cobas 2003) Cobas,JuanCarlos. “The Basics of Endianness,” http://www.codeproject.com/cpp/endianness.asp. The Code Project, 2003.

[biblio12_12] (Microsoft 2006b) Microsoft Corporation. Platform SDK: DLLs, Processes, and Threads, “Job Objects,” http://msdn.microsoft.com/library/en-us/dllproc/base/job_objects.asp. MSDN, 2006.

[biblio12_13] (Robbins 2003) Robbins,John. Debugging Applications for Microsoft .NET and Microsoft Windows. Redmond, WA: Microsoft Press, 2003.

[biblio12_14] (Howard 2003) Howard, Michael, Microsoft Corporation. “Analyzing Your Applications with Windows Application Verifier,” http://msdn.microsoft.com/library/en-us/dncode/html/secure12112003.asp. MSDN, December 2003.

[biblio12_15] (Nuwere and Varpiola 2005) Nuwere, Ejovi, and Mikko Varpiola, SecurityLab Technologies, Inc. Black Hat 2005, “The Art of SIP Fuzzing and Vulnerabilities Found in VoIP,” http://www.blackhat.com/presentations/bh-jp-05/bh-jp-05-nuwere.pdf. July 2005.

[biblio12_16] (Boutin 2003) Boutin,Paul. “Slammed!” http://www.wired.com/wired/archive/11.07/slammer.html. Wired, July 2003.

[biblio12_17] (Cenzic 2006) CenzicHailstorm, www.cenzic.com.

[biblio12_18] (SecurityTracker 2006) SecurityTracker. “Novell Remote Manager for SUSE Linux Content-Length Heap Overflow Lets Remote Users Execute Arbitrary Code,” http://www.securitytracker.com/alerts/2006/Jan/1015487.html. January 2006.

[biblio12_19] (Corsaire 2004) Corsaire Limited. “Penetrating Testing Guide,” http://www.penetration-testing.com/. 2004.

[biblio12_20] (Microsoft 2005) Microsoft Help and Support. “How to Use Driver Verifier to Troubleshoot Windows Drivers,” http://support.microsoft.com/default.aspx?scid=kb;en-us;244617. Last Review: January 2005.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.254.138