Links / Documentation
Programming Related Papers

A compendium of NP optimization problems - Pierluigi Crescenzi, Viggo Kann & al
Algorithmique du Texte - Crochemore et Lecroq
Algorithms on Strings, Trees and Sequences - Dan Gusfield
Argante - Michal Zalewksi
Art of Assembly Language Programming - Randall Hyde
Artificial Consciousness: Neural Networks Revised - Michal Zalewski
Backpropagator's Review - Donald R. Tveter
Code Optimization Using the GNU C Compiler - Rahul U Joshi
Collection of Software Bugs - Thomas Huckle
Crible quadratique, fractions continuées et consorts - Cyril Banderier
D Programming Language - Digital Mars
Debugging with GDB - Richard Stallman
Design Elements of the FreeBSD VM - Matthew Dillon
Design Patterns - Gang of Four
Detecting Format String Vulnerabilities with Type Qualifiers - David Wagner
Dictionary of Algorithms and Data Structures - NIST
Exact String Matching - Christian Charras et Thierry Lecroq
First Step Towards Automated Detection of Buffer Overrun Vulnerabilities - David Wagner
FreeBSD Assembly Language Programming - G. Adam Stanislav
GNU C Library - Free Software Foundation
GNU Coding Standards - Free Software Foundation
Hack en C - Nicolas Boulay
Hurd Hacking Guide - Wolfgang Jährling
Infecting loadable kernel modules - truff
Introduction to Algorithms, Second Edition - Charles E. Leiserson et Ronald L. Rivest
Kernel Scheduling Entities - The FreeBSD project
Kqueue : A generic and scalable event notification facility - Jonathan Lemon
Langage C ANSI : Vers une pensée objet en Java - Philippe Drix
Langage C Norme ANSI - Brian W. Kernighan et Denis M. Ritchie
Langages de Script sous Linux - Christophe Blaess
Maîtrise des Algorithmes en C - Kyle Loudon
Memory Management in Linux - Abhishek Nayani
Méthodologie de la Programmation en C - Jean Pierre Braquelaire
Pattern Matching Algorithms - Apostolico et Galil
Programming in C : UNIX System Calls and Subroutines using C - A. D. Marshall
Recent File System Optimisations in FreeBSD - Ian Dowse & David Malone
Reflections on Trusting Trust - Ken Thompson
RunTime : Context Switching - Edward G. Bradford
RunTime : Scheduling threads - Edward G. Bradford
Secure Programming for Linux and Unix HOWTO - David A. Wheeler
State Threads for Internet Applications - Gene Shekhtman et Mike Abbott
Stuttgart Neural Network Simulator User Manual - IPVR
The Art of Computer Programming - Donald Knuth
The C Preprocessor - Richard Stallman
The Design and Implementation of the 4.4BSD Unix Operating System - Kirk McKusick, Keith Bostic, Michael J. Karels & John S. Quarterman
Unix Assembly Codes Development for Vulnerabilities Illustration Purpose - Last Stage of Delirium
Using Assembly Language in Linux - phillip
Using the GNU Compiler Collection - Andreas Zeller
strlcat and strlcat : consistent, safe, string copy and concatenation - Todd C. Miller


Network Related Papers

ACK Tunneling Trojan - Arne Vidstorm
ALTQ Tips - Kenjiro Cho
An Initial Security Analysis of the IEEE 802.1X Protocol - William Arbaugh et Arunesh Mishra
An Overview of Internet Routing - krnl
Basics of Network Segmentation : Switching and Bridging - Michael Norton
BlackHole Route Server and Tracking Trafic on an IP Network - Chris Morrow
Covert Channel in the TCP/IP Protocol Suite - Craig Rowland
Default TTL Values in TCP/IP - SWITCH
Estimating Bandwidth and Other Network Properties - Bruce A. Mah
Firewalking : A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Access Control Lists - Mike Schiffman
Flexible Packet Filtering : Providing a Rich Toolbox - Kurt Lidl, Deborah Lidl & Paul Borman
HTB Linux queuing discipline manual - Martin Devera aka devik
How wireless networks scale : the illusion of spectrum scarcity - David P. Reed
ICMP based remote OS TCP/IP stack fingerprinting techniques - Ofir Arkin & Fyodor Yarochkin
IPv6, Théorie et Pratique - Gisèle Cizault
Introduction à Libnids - Frédéric Lavécot
Introduction à la Libpcap - Frédéric Lavécot
Know Your Ennemy: Passive Fingerprinting - Lance Spitzner
P5: A Protocol for Scalable Anonymous Communications - Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan
Passive OS Fingerprinting : Details and Techniques - Toby Miller
Project Loki: ICMP Tunnelling - daemon9
Protecting Network Infrastructure - Curt Wilson
Protection de l'infrastructure réseau IP en environnement Cisco - Nicolas Fischbach et Sebastien Lacoste-Seris
RFC 1122 : Requirements for Internet Hosts -- Communication Layers - IETF
RFC 1191 : Path MTU Discovery - IETF
RFC 1323 : TCP Extensions for High Performance - IETF
RFC 1858 : Security Considerations for IP Fragment Filtering - IETF
RFC 1948 : Defending Against Sequence Number Attacks - IETF
RFC 2001 : TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms - IETF
RFC 2018 : TCP Selective Acknowledgment Options - IETF
RFC 2581 : TCP Congestion Control - IETF
RFC 2960 : Stream Control Transmission Protocol - IETF
RFC 3168 : The Addition of Explicit Congestion Notification (ECN) to IP - IETF
RFC 813 : Windows and Acknowledgment Strategy in TCP - IETF
RFC 815 : IP Datagram Reassembly Algorithms - IETF
Securing the Border Gateway Routing Protocol - Bradley R. Smith
Security of the WEP algorithm - Nikita Borisov, Ian Goldberg et David Wagner
Sniffing (Network wiretrap, sniffer) FAQ - Robert Graham
Strange Attractors and TCP/IP Sequence Number Analysis - Michal Zalewski
Syn Cookies - D.J. Bernstein
Threat Models introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6 - IETF MobileIP WG


Security Related Papers

(nearly) Complete Linux Loadable Kernel Modules - pragmatic
A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks - Istvan Simon
A Data Mining Framework for Adaptive Intrusion Detection - Columbia University
A Distributed Autonomous-Agent Network-Intrusion Detection and Response System - Joseph Barrus
A Guide to Understanding Covert Channel Analysis of Trusted Systems - National Computer Security Center
A Guide to Understanding Covert Channel Analysis of Trusted Systems (aka Light Pink Book) - NCSC
A Pattern Matching Model for Misuse Intrusion Detection - COAST/Purdue University
APIHijack : A Library for Easy DLL Function Hooking - Wade Brainerd
Advanced Host Detection : Techniques To Validate Host-Connectivity - dethy
Advantage of tcp_wrappers - Dan Langille
An Application of Pattern Matching in Intrusion Detection - COAST/Purdue University
An Architecture for Intrusion Detecion using Autonomous Agents - COAST/Purdue University
Analysis of Bernsteins Factorization Circuit - Arjen K. Lenstra, Adi Shamir, Jim Tomlinson & Eran Tromer
Architectural Implications of Covert Channels - Norman E. Proctor & Peter G. Neumann
Armoring FreeBSD - Markus Delves
Attacking FreeBSD with Kernel Modules - Pragmatic
Attacking Windows 9x with Loadable Kernel Modules - Solar Eclipse
Attacks on Steganographic Systems - Andreas Westfeld and Andreas Pfitzmann
Automated Detection of Vulnerabilities in Priviliged Programs by Monitoring - University of California
Autonomous Agents for Distributed Intrusion Detection in a Multi-Host Environment - Dennis Ingram
Backdooring Binary Object - Klog
Backdoors - Christopher Klaus
Being Prepared for Intrusion - Dan Farmer et Wietse Venema
Bro : A System for Detecting Network Intruders in Real-Time - Vern Paxson
Buffer Overflow : le retour - Rix
Buffer Overflows : Attacks and Defenses for the Vulnerability of the Decade - Crispin Cowan
Burning the bridge: Cisco IOS exploits - FX
Computer Forensics : Incident Response Essentials - Warren Kruse et Jay G. Heiser
Computer Intrusion Detection and Network Monitoring - Marchette
Computer Security Analysis through Decompilation and High-Level Debugging - Cristina Cifuentes, Trent Waddington & Mike Van Emmerik
Computer Security Incident Handling Step By Step Guide - Stephen Northcutt
Configuration of IPFilter on FreeBSD - Georg Wagner
Data Mining Approaches for Intrusion Detection - Columbia University
Data Mining Methods for Detection of New Malicious Executables - Columbia University
Defeating Forensic Analysis on Unix - the grugq
Defeating Sniffers and Intrusion Detection Systems - Horizon
Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML - Don Davis
Delivering Signals for Fun and Profit - Michael Zalewski
Detecting Backdoors - Yin Zhang
Detecting Intrusions : Methods of detecting intrusion attempts and security breaches - Allaire Security
Detecting Loadable Kernel Modules - Toby Miller
Deviation - AntiOffline
Distributed Intrusion Detection for Computer Systems Using Communicating Agents - Dennis Ingram / Neil Rowe
Dynamic Kernel Linker (KLD) Facility Programming Tutorial - Andrew Reiter
Executable and Linkable Format Specifications - Brian Raiter
Exploitation avancée de buffer overflows - Olivier Gay
Exploiting Kernel Buffer Overflows FreeBSD Style - Esa Etelavuori
FAQ: Network Intrusion Detection Systems - Robert Graham
Fighting Rootkit and Similar Trojans: Integrity Checkers and Trojan detectors - Softpanorama University
Fix The Bugs, Secure The System - Louis Bertrand
Focus IDS FAQ - PacketNexus
Fragroute : NIDS Testing Revisited - Dug Song
Frame Pointer Overwriting - Klog
FreeBSD Security Howto - jkb
Fun and Games with FreeBSD Kernel Modules - Stephanie Wehner
HMAC Papers - Misc
Handbook of Applied Cryptography - Alfred J. Menezes
Hijacking Linux Page Fault Handler Exception Table - buffer
Honeynets - Chris Brenton
Honeypots: Definitions and Value of Honeypots - Lance Spitzner
How To Code Stack Based Exploits - Dethy
How To Write Buffer Overflow - Mudge
How to Build a FreeBSD-STABLE Firewall with IPFILTER - Marty Schlacter
ID Pratical Assignment - Lenny Zeltser
IP Filter Based Firewalls Howto - Brendan Conoboy
Incident Response : Investigating Computer Crime - Chris Prosise et Kevin Mandia
Infrastructure for Intrusion Detection and Response - NAI
Injecting a DLL into Another Process's Address Space - Zoltan Csizmadia
Insecure Programming by example - gera
Insertion, Evasion and Denial of Service : Eluding Network Intrusion Detection - Thomas Ptacek / Tim Newsham
Intelligent Profiling by Example - Sybil Shearin
Interacting Neural Networks and Cryptography - Wolfgang Kinzel and Ido Kanter
Interface Promiscuity Obscurity - Apk
Intrusion Detection - Rebecca Gurley Bace
Intrusion Detection : An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response - Edward G. Amoroso
Intrusion Detection FAQ - SANS Institute
Intrusion Detection Inter-compoment Adaptive Negociation - University of California
Intrusion Detection Interoperability and Standardization - Pravin Kothari
Intrusion Detection Message Exchange Requirements - IETF Intrusion Detection Working Group
Intrusion Detection System Product Survey - Kathleen Jackson
Intrusion Detection and Response - Livermore National Laboratory
Intrusion Detection: Knowing when someone is knocking on your door - Lance Spitzner
Intrusion Signatures and Analysis - Stephen Northcutt
Kernel hacking made easy - Nicolas Dubee
Know Your Ennemy; Honeynets - Lance Spitzner
La Signature Électronique - Arnaud F. Fausse
Linux Capabilities FAQ 0.2 - ?
Linux Kernel Hardening - Anton Chuvakin
Linux Kernel Module Programming Guide - Ori Pomerantz
Linux et sa Sécurité - idealx
Mining in a Data Flow Environment : Experience in Network Intrusion Detection - Columbia University
Monitoring File System Integrity with Tripwire - Gene Kim
Network Intrusion Detection : An Analyst's Handbook 2E - Stephen Northcutt
Network Intrusion Detection : Evasion, Traffic Normalization, and End-to-End Protocol Semantics - Vern Paxson
Network Intrusion Detection Signatures, Part Five - Karen Frederick
Network Intrusion Detection Signatures, Part Four - Karen Frederick
Network Intrusion Detection Signatures, Part One - Karen Frederick
Network Intrusion Detection Signatures, Part Three - Karen Frederick
Network Intrusion Detection Signatures, Part Two - Karen Frederick
Next Generation Intrusion Detection Expert System, A Summary - SRI
Once upon a free()... - anonymous
One of These Things is not Like the Others: The State of Anomaly Detection - Matthew Tanase
OpenBSD bridge without IPs using IPF Tutorial - Doug Hogan
Overview of Certification Systems : X.509, CA, PGP and SKIP - Edgardo Gerck
Parallel random number generators - Stephen Booth
Pattern Matching et Détection d'Intrusion - Matthieu Huin
Playing Hide and Seek, Unix Style - Phreak Accident
Polymorphisme et Camouflage de Shellcodes - Julien Olivain
Real-Time Data Mining-based Intrusion Detection - Columbia University
Reverse Engineering Malware - Lenny Zeltser
Root Kits and hiding files/directories/processes after a break-in - Dittrich
Run-time Detection of Heap-based Overflows - W. Robertson, C. Kruegel, D. Mutz, F. Valeur
Running a BSD-based Firewall - Jim O'Gorman
Runtime Process Infection - anonyme
Secure Programming: Buffer Overflow - Frederic Raynal, Christophe Blaess et Christophe Grenier
Securing BSD Daemons - Dru Lavigne
Securing MySQL: step-by-step - Artur Maj
Sequence Matching and Learning in Anomaly Detection for Computer Security - Purdue University
Setuid Demystified - Hao Chen, David Wagner & Drew Dean
Smashing C++ VPTRs - Rix
Smashing the Stack for Fun and Profit - Aleph1
SnortNet - A Distributed Intrusion Detection System - Fyodor Yarochkin
Solaris Loadable Kernel Modules - Plasmoid
Stack Inspection : Theory and Variants - Andrew G. Gordon & Cédric Fournet
Summary about POSIX.1e/2c - IEEE
Synthèse d'Articles de Recherche sur la détection d'intrusions - Guill.net
Syscall Redirection without Modifying the Syscall Table - Silvio Cesare
Sécuriser ses échanges électroniques avec une PKI - Laurent Bellefin and Thierry Autret
The Open Source PKI Book - OpenCA Team
The OpenBSD Packet Filter HOWTO - Wouter Coene
The Signal Detection Theory - David Heeger
The Tao of Windows Buffer Overflow - DilDog
Timing Analysis of Keystrokes and Timing Attacks on SSH - Dawn Xiaodong Song, David Wagner & Xuqing Tian
Transparent Packet Filtering with OpenBSD - Nate Underwood
UNIX Security Checklist v2.0 - CERT/CC et AusCERT
Understanding the Linux Kernel - Daniel Bovet
Unix Backup and Recovery - W. Curtis Preston
Virtual Honeynets - Michael Clark
Virtual Private Networks / Frequently Asked Questions - Tina Bird
Vudo: An object superstitiously believed to embody magical powers - Michel MaXX Kaempf
Vulnerability in 4.4BSD Secure Levels Implementation - Niall Smart
Warhol Worms : The Potential for Very Fast Internet Plagues - Nicholas C. Weaver
Win32 Buffer Overflow - Dark Spyrit
Writing buffer overflow exploits: a tutorial for beginners - Mixter
Writing ia32 alphanumeric shellcodes - rix
how to 0wn the Internet in Your Spare Time - Vern Paxson, Nick Weaver & Stuart Stanford
mtree : a built-in tripwire - Georg Wagner
w00w00 on Heap Overflow - Shok


Security Related Project Sites

Advanced Intrusion Detection Environment (AIDE)
BIRD
CFEngine
Chkrootkit
Common Vulnerabilities and Exposures
Community-Based Open Source Security (CBOSS)
DSniff
Deception Toolkit
Ethereal
Fenris
Firewalk
FormatGuard
FreeBSD Source Auditing Project
FreeS/WAN
FreeVeracity
G2S
HT Editor
HUNT
HoneyD
Hping
IP Stack Integrity Checker (ISIC)
IPA - IP Accounting System - Andrey Simonenko
InlineEgg - Gera
LIDS
LaBrea
LibSafe
Libelf
Linux Intrusion Detection System (LIDS)
Nessus
Network Security Services
Open Source Quality (OPQ)
OpenBSD
OpenBSD Packet Filter
OpenCA
OpenPAM
OpenSSH
OpenSSL
OutGuess
Owl
Prelude
SMS spoof
Saint Jude / Saint Michael
Samhain
Secure Mobile Networking Project
Snort
StackGuard
Systrace
The Coroner Toolkit
The GNU Privacy Guard (GPG)
The Network MAPper (NMAP)
The Simple WATCHer (SWATCH)
TinyCC
Titan
Trinux
TripWire Open Source Project
TrustedBSD
Write-Ahead File System (WAFS)
fragroute
libdnet
libevent
mothra3
p0f
spamassassin
stunnel - STunnel


Repository and Knowledge Sites

Cisco's Internetworking Technology Overview
EFF Archives
Granite Island Group TSCM
HSC Security Tips
InfoSysSec
InterOperability Lab : Tutorials
OUAH
Packet Storm
ResearchIndex : The NECi Scientific Literature Digital Library
Securite.org
Silicon Defense's Traceback and Related Papers Archive
WhiteHats


Team and/or People Sites

ADM
Afturgurluk
Ambient Empire
Andrew D. Gordon
AngryPacket
Antifork
Corest Community
Crist J. Clark
Cristina Cifuentes
Dag-Erling Smorgrav
David Wagner
DevHell
Dug Song
Frederic Raynal
Fyodor Yarochkin
HERT
Hervé Schauer Consultants
Horizon
Last Stage of Delirium
Michal Zalewski
Mixter
Niels Provos
Nomad Mobile Reseach Center
Packet Factory
Phenoelit
Phrack
Phreedom
Poul-Henning Kamp
Razor
Robert Watson
S0ftpr0ject
Solar Designer
Synnergy
TESO
The Hacker's Choice
Theo de Raadt
Vern Paxson
eXperts
kernelnewbies
scut
stealth
subk
w00w00