Steve Beattie
Oregon Health & Science University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Steve Beattie.
Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems] | 2003
Crispin Cowan; Perry Wagle; Calton Pu; Steve Beattie; Jonathan Walpole
Buffer overflows have been the most common form of security vulnerability for the last ten years. More over, buffer overflow vulnerabilities dominate the area of remote network penetration vulnerabilities, where an anonymous Internet user seeks to gain partial or total control of a host. If buffer overflow vulnerabilities could be effectively eliminated, a very large portion of the most serious security threats would also be eliminated. In this paper, we survey the various types of buffer overflow vulnerabilities and attacks, and survey the various defensive measures that mitigate buffer overflow vulnerabilities, including our own StackGuard method. We then consider which combinations of techniques can eliminate the problem of buffer overflow vulnerabilities, while preserving the functionality and performance of existing systems.
darpa information survivability conference and exposition | 2003
Crispin Cowan; Seth Arnold; Steve Beattie; Chris Wright; John Viega
Immunix/spl trade/ is a Linux system hardened with several DARPA-funded security technologies to produce a highly survivable server appliance platform. The Immunix technologies include: StackGuard, FormatGuard, RaceGuard, SubDomain, and LSM (Linux Security Modules). Combined, these technologies make it very difficult for an attacker to break into an Immunix server, despite the presence of unpatched vulnerabilities, while also preserving a high degree of compatibility with standard Linux systems. The Defcon Capture-the-Flag (CtF) contest is the largest open security hacking game. The 2002 game was designed to make it particularly difficult for defenders to defend their servers by forcing players to host software known to be vulnerable. Our DISCEX III paper describes our experience playing an Immunix server in this game: we placed second overall, and no one was able to take control of the Immunix server.
usenix security symposium | 1998
Crispin Cowan; Calton Pu; Dave Maier; Heather Hintony; Jonathan Walpole; Peat Bakke; Steve Beattie; Aaron Grier; Perry Wagle; Qian Zhang
usenix security symposium | 2003
Crispin Cowan; Steve Beattie; John Johansen; Perry Wagle
usenix security symposium | 2001
Crispin Cowan; Matt Barringer; Steve Beattie; Greg Kroah-Hartman; Michael Frantzen; Jamie Lokier
usenix large installation systems administration conference | 2002
Steve Beattie; Seth Arnold; Crispin Cowan; Perry Wagle; Chris Wright; Adam Shostack
usenix large installation systems administration conference | 2000
Crispin Cowan; Steve Beattie; Greg Kroah-Hartman; Calton Pu; Perry Wagle; Virgil D. Gligor
Archive | 1999
Crispin Cowan; Steve Beattie; Ryan Finnin Day; Calton Pu; Perry Wagle; Erik Walthinsen
usenix security symposium | 2001
Crispin Cowan; Steve Beattie; Chris Wright; Greg Kroah-Hartman
usenix security symposium | 1998
Crispin Cowan; Calton Pu; David Maier; Jonathan Walpole; P. Bakke; Steve Beattie; Aaron Grier; Perry Wagle; Qing-Yu Zhang; Heather Maria Hinton