Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Steve Beattie is active.

Publication


Featured researches published by Steve Beattie.


Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems] | 2003

Buffer overflows: attacks and defenses for the vulnerability of the decade

Crispin Cowan; Perry Wagle; Calton Pu; Steve Beattie; Jonathan Walpole

Buffer overflows have been the most common form of security vulnerability for the last ten years. More over, buffer overflow vulnerabilities dominate the area of remote network penetration vulnerabilities, where an anonymous Internet user seeks to gain partial or total control of a host. If buffer overflow vulnerabilities could be effectively eliminated, a very large portion of the most serious security threats would also be eliminated. In this paper, we survey the various types of buffer overflow vulnerabilities and attacks, and survey the various defensive measures that mitigate buffer overflow vulnerabilities, including our own StackGuard method. We then consider which combinations of techniques can eliminate the problem of buffer overflow vulnerabilities, while preserving the functionality and performance of existing systems.


darpa information survivability conference and exposition | 2003

Defcon Capture the Flag: defending vulnerable code from intense attack

Crispin Cowan; Seth Arnold; Steve Beattie; Chris Wright; John Viega

Immunix/spl trade/ is a Linux system hardened with several DARPA-funded security technologies to produce a highly survivable server appliance platform. The Immunix technologies include: StackGuard, FormatGuard, RaceGuard, SubDomain, and LSM (Linux Security Modules). Combined, these technologies make it very difficult for an attacker to break into an Immunix server, despite the presence of unpatched vulnerabilities, while also preserving a high degree of compatibility with standard Linux systems. The Defcon Capture-the-Flag (CtF) contest is the largest open security hacking game. The 2002 game was designed to make it particularly difficult for defenders to defend their servers by forcing players to host software known to be vulnerable. Our DISCEX III paper describes our experience playing an Immunix server in this game: we placed second overall, and no one was able to take control of the Immunix server.


usenix security symposium | 1998

StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks

Crispin Cowan; Calton Pu; Dave Maier; Heather Hintony; Jonathan Walpole; Peat Bakke; Steve Beattie; Aaron Grier; Perry Wagle; Qian Zhang


usenix security symposium | 2003

Pointguard TM : protecting pointers from buffer overflow vulnerabilities

Crispin Cowan; Steve Beattie; John Johansen; Perry Wagle


usenix security symposium | 2001

FormatGuard: automatic protection from printf format string vulnerabilities

Crispin Cowan; Matt Barringer; Steve Beattie; Greg Kroah-Hartman; Michael Frantzen; Jamie Lokier


usenix large installation systems administration conference | 2002

Timing the Application of Security Patches for Optimal Uptime

Steve Beattie; Seth Arnold; Crispin Cowan; Perry Wagle; Chris Wright; Adam Shostack


usenix large installation systems administration conference | 2000

SubDomain: Parsimonious Server Security

Crispin Cowan; Steve Beattie; Greg Kroah-Hartman; Calton Pu; Perry Wagle; Virgil D. Gligor


Archive | 1999

Protecting Systems from Stack Smashing Attacks with StackGuard

Crispin Cowan; Steve Beattie; Ryan Finnin Day; Calton Pu; Perry Wagle; Erik Walthinsen


usenix security symposium | 2001

RaceGuard: kernel protection from temporary file race vulnerabilities

Crispin Cowan; Steve Beattie; Chris Wright; Greg Kroah-Hartman


usenix security symposium | 1998

Automatic detection and prevention of buffer-overflow attacks

Crispin Cowan; Calton Pu; David Maier; Jonathan Walpole; P. Bakke; Steve Beattie; Aaron Grier; Perry Wagle; Qing-Yu Zhang; Heather Maria Hinton

Collaboration


Dive into the Steve Beattie's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Calton Pu

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Maier

Portland State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge