Publications
Azimuth consultants have long been active participants in the security community. Some of our larger contributions include a comprehensive book on software security assessment, and a supporting blog and website focused on software security.
The Art of Software Security Assessment - Mark Dowd, John McDonald, and Justin Schuh (November 2006)
This is a 1200 page Addison-Wesley Professional book focusing on software security assessment. It teaches the reader how to audit applications across a wide range of technologies and platforms. The book's primary focus is on utilizing manual source code review to find security flaws, and it reinforces this skill through the use of extensive examples drawn from real-world code.
This book was published by Addison-Wesley Professional.
The Art of Software Security Assessment Blog - Mark Dowd, John McDonald, and Justin Schuh (2006 - 2009)
This website was created to support our book, and provide a platform for the authors to publish additional material. There are several original articles published here, including security research, coding challenges, example vulnerable code, and a collection of resources and links for each chapter in the book.
This website was created by Mark Dowd and John McDonald of Azimuth Security, and Justin Schuh of Google.
Whitepapers
Azimuth consultants have authored a few notable whitepapers on security research topics
Heap Cache Exploitation - John McDonald (July 2009)
This paper discusses several innovative exploitation techniques for the Windows XP and Windows 2003 operating systems. It specifically focuses on an undocumented part of the heap implementation named the heap cache, which is responsible for large block allocations.
This work was performed on behalf of IBM ISS X-Force.
Application Specific Attacks: Leveraging the ActionScript Virtual Machine - Mark Dowd (April 2008)
This paper discusses the exploitation of a specific flaw uncovered in Adobe Flash. Specifically, it explores a technique that incorporates the ActionScript Virtual Machine (AVM) to reliably exploit a memory corruption flaw that would otherwise be difficult to leverage with traditional techniques.
This work was performed on behalf of IBM ISS X-Force.