The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Gates, Bill

GATEWAY_INTERFACE (environment variable)

gateways

     system call gateways

GECOS field, UNIX

general CP (candidate point) strategy, code audits

generalization approach, application review

GET method 2nd

get_mac( ) function

get_string_from_network( ) function

get_user( ) function

GetCurrentProcess( ) function

GetFullPathName( ) Call in Apache 2.2.0 listing (8-14)

GetFullPathName( ) function

GetLastError( ) function 2nd

GetMachineName( ) function

getrlimit( ) function

GIDs (group IDs), UNIX 2nd

global namespaces, Windows NT

global overflows

globbing characters, UNIX programs, indirect invocation

GNU/Linux

Govindavajhala, Sudhakar

Greenman, David

group ID functions (UNIX)

group IDs (GIDs), UNIX

     functions

group lists, Windows NT sessions, SIDs

groups, UNIX

     effective groups

     file security

     GIDs (group IDs) 2nd 3rd

     login groups

     primary groups

     privilege vunerabilities

     process groups

     real groups

     saved set groups

     secondary groups

     setgid (set-group-id)

     supplemental groups 2nd

Guninski, Giorgi 2nd

Категории