UP | HOME
../../

Secure Programming in C/ C++

1 Buffer Overflow + Smashing The Stack

  1. Prabhaker Mateti, "Buffer Overflow", http://www.cs.wright.edu/~pmateti/ InternetSecurity/ Lectures/ BufferOverflow/, 2012. (This article not the embedded Aleph One article) Required Reading.
  2. Secure Programming for Linux and Unix HOWTO – Creating Secure Software http://www.dwheeler.com/secure-programs/ 2003. Reference
  3. Ulfar Erlingsson, Yves Younan, and Frank Piessens "Low-Level Software Security by Example" 2008 Chapter 30 Low-Level Sofware Security by Example.pdf URL TBD Recommended Reading

2 Code Analysis Tools and Run-time Protection

  1. [Web search for URLs]
  2. Splint for C
  3. RatScan 6 (a graphical front end to RATS)
  4. Coverity.com
  5. CodeSonar 7 from Grammatech
  6. en.wikipedia.org List-of-tools-for-static-code-analysis
  7. Common Weakness Scoring System Recommended Reading.

3 References

  1. [Book] Introduction to Computer Security, Michael Goodrich, University of California, Irvine Roberto Tamassia, Brown University, Addison Wesley, 2011. Reference
  2. Robert C. Seacord, Secure Coding in C and C++, 600 pages, Addison-Wesley Professional; 2 edition, 2013 Recommended Reading.

Copyright © 2016 pmateti@wright.edu www.wright.edu/~pmateti 2016-03-16