References

[ASLR1] Exploit Mitigation Improvements in Windows 8, Ken Johnson, Ma, Miller, http://media.blackhat.com/bh-us-12/Briefings/M_Miller/BH_US_12_Miller_Exploit_Mitigation_Slides.pdf

[ASLR2] Enhance Memory Protections in IE10, http://blogs.msdn.com/b/ie/archive/2012/03/12/enhanced-memory-protections-in-ie10.aspx

[CHECKEDC] _Checked C https://www.microsoft.com/en-us/research/project/checked-c/

[DEP] Exploit Mitigation Improvements in Windows 8, Ken Johnson, Ma, Miller, http://media.blackhat.com/bh-us-12/Briefings/M_Miller/BH_US_12_Miller_Exploit_Mitigation_Slides.pdf

[GCC] Proposal to add a new stack-smashing-attack protection mechanism “-fstack-protector-strong”, https://docs.google.com/document/d/1xXBH6rRZue4f296vGt9YQcuLVQHeE516stHwt8M9xyU/edit

[IA32SDM] Intel® 64 and IA-32 Architectures Software Developer’s Manual, www.intel.com

[MemMap] A Tour Beyond BIOS Memory Map And Practices in UEFI BIOS, Jiewen Yao, Vincent Zimmer, 2016 https://github.com/tianocore-docs/Docs/raw/master/White_Papers/A_Tour_Beyond_BIOS_Memory_Map_And_Practices_in_UEFI_BIOS_V2.pdf

[MemProtection] A Tour Beyond BIOS- Memory Protection in UEFI BIOS, Jiewen Yao, Vincent Zimmer, 2017 https://www.gitbook.com/book/edk2-docs/a-tour-beyond-bios-memory-protection-in-uefi-bios/details

[MPX] Intel® Memory Protection Extensions Enabling Guide https://software.intel.com/en-us/articles/intel-memory-protection-extensions-enabling-guide

[MSVC] Compiler Security Checks In Depth, https://msdn.microsoft.com/library/aa290051.aspx

[MSVCGS] /GS (Buffer Security Check)_, https://msdn.microsoft.com/en-us/library/8dbf701c.aspx

[MSVCRTC] /RTC (Run-Time Error Checks)_, https://msdn.microsoft.com/en-US/library/8wtf2dfz.aspx

[MSVCFASTFAIL] __fastfail, [https://msdn.microsoft.com/en-us/library/dn774154.aspx](https://msdn.microsoft.com/en-us/library/dn774154.asp

[OpenBSD] Exploit Mitigation Techniques, Theo de Raadt, http://www.openbsd.org/papers/ven05-deraadt

[PaX] PaX presentation, Brad Spengler, https://grsecurity.net/PaX-presentation.ppt

[PaX] PaX Home Page, https://pax.grsecurity.net/

[PI] UEFI Platform Initialization Specification, Version 1.5 http://www.uefi.org/sites/default/files/resources/PI%201.5.zip

[PIE] OpenBSD’s Position Independent Executable (PIE) Implementation, Kurt Miller, http://www.openbsd.org/papers/nycbsdcon08-pie/

[RUST] Rust language https://www.rust-lang.org/en-US/

[StackCanaries] http://en.wikipedia.org/wiki/Buffer_overflow_protection

[StackCheck] StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. Cowan, C., Pu, C., Maier, D., Hintongif, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q. Proceedings of the 7th USENIX Security Symposium (January 1998), https://www.usenix.org/legacy/publications/library/proceedings/sec98/full_papers/cowan/cowan.pdf

[Tanenbaum]Modern Operating Systems, 4th edition, Andrew S. Tanenbaum, Herbert Bos, Pearson, 2014, ISBN: 978-0133591620

[UEFI] Unified Extensible Firmware Interface (UEFI) Specification, Version 2.6 www.uefi.org

[Veen] Memory Errors: the Past, the Present, and the Future, Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, and Herbert Bos, 2012, Research in Attacks, Intrusions, and Defenses, Volume 7462 of the series Lecture Notes in Computer Science pp 86-106. Springer, ISBN 978-3-642-33337-8

[WindowsHeap] Preventing the exploitation of user mode heap corruption vulnerabilities, 2009, https://blogs.technet.microsoft.com/srd/2009/08/04/preventing-the-exploitation-of-user-mode-heap-corruption-vulnerabilities/

[WindowsHeap2] Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass, Alexander Anisimov, 2004, https://www.ptsecurity.com/ww-en/download/defeating-xpsp2-heap-protection.pdf

[WindowsHeap3] Attacking the Vista Heap, Ben Hawkes, 2008, http://www.blackhat.com/presentations/bh-usa-08/Hawkes/BH_US_08_Hawkes_Attacking_Vista_Heap.pdf

[WindowsHeap4] Practical Windows XPSP3/2003 Heap Exploitation, John McDonald and Christopher Valasek, 2009, http://www.blackhat.com/presentations/bh-usa-09/MCDONALD/BHUSA09-McDonald-WindowsHeap-PAPER.pdf

[WindowsInternal] Windows Internals, 6th edition, Mark E. Russinovich, David A. Solomon, Alex Ionescu, 2012, Microsoft Press. ISBN-13: 978-0735648739/978-0735665873 https://www.amazon.com/Windows-Internals-Part-Developer-Reference/dp/0735648735

Last updated