FreeBSD developers' handbook.2001
.pdfXIV. Compatibility Layers
Chapter 28 Linux
Linux, SVR4, etc
313
XV. Appendices
Bibliography
[1]Dave A Patterson and John L Hennessy, 1998, 1-55860-428-6, Morgan Kaufmann Publishers, Inc., Computer Organization and Design: The Hardware / Software Interface, 1-2.
[2]W. Richard Stevens, 1993, 0-201-56317-7, Addison Wesley Longman, Inc., Advanced Programming in the Unix Environment, 1-2.
[3]Marshall Kirk McKusick, Keith Bostic, Michael J Karels, and John S Quarterman, 1996, 0-201-54979-4, Addison-Wesley Publishing Company, Inc., The Design and Implementation of the 4.4 BSD Operating System, 1-2.
[4]Aleph One, Phrack 49; "Smashing the Stack for Fun and Profit".
[5]Chrispin Cowan, Calton Pu, and Dave Maier, StackGuard; Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
[6]Todd Miller and Theo de Raadt, strlcpy and strlcat -- consistent, safe string copy and concatenation..
Index
A
arguments, 37
B
bounds checking compiler-based, 39 library-based, 40
buffer overflow, 37, 39
C
CERT
security advisories, 37 chroot(), 40
D
data validation, 42
F
frame pointer, 37
G
gcc, 39
J
jail, 41
315
L
LIFO, 37
M
Morris Internet worm, 37
N
NUL termination, 39
O
OpenBSD, 39
P
Perl Taint mode, 42 positive filtering, 42
POSIX.1e Process Capabilities, 41 process image
frame pointer, 37 stack pointer, 37
R
race conditions access checks, 42 file opens, 42
signals, 42 return address, 37
S
seteuid, 40 stack, 37
stack frame, 37 stack pointer, 37 stack-overflow, 37 StackGuard, 39 string copy functions
strlcat, 39 strlcpy, 39 strncat, 39 strncpy, 39
T
TrustedBSD, 41
U
user IDs
effective user ID, 40 real user ID, 40
V
Von-Neuman, 37