A Survey on Windows Component Loading Vulnerabilities
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 5
Abstract
Dynamic loading is a mechanism by which a computer program can, at run time, load a library memory, retrieve the addresses of functions and variables contained in library, execute those functions, and unload the library from memory. Unlike static linking and load time linking, this mechanism allows a computer program to startup in the absence of those libraries, to discover available libraries, and potentially gain additional functionality. Operating systems generally provide two resolution methods, by specifying the full path or the filename of the target component. This common component resolution strategy has an inherent security problem. As only a file name is given, unintended or malicious files with the same file name can be resolved instead. Therefore this paper presents the various vulnerabilities and work related to dynamic component loading vulnerabilities
Authors and Affiliations
U. Haritha , V. Lokanadham Naidu
A BRIEF SURVEY ON THE CONCEPTS OF AGENT AND ARTIFICIAL IMMUNE SYSTEMS
Agents are probably the fastest growing area Information Technology. As agents has ability to migrate to any system, perform the tasks and return the results. The field of software agents is a broad and rapidly dev...
Quantify the intersection of behavior in the work environment
—This is the study of intersection of behaviour to analyze the behaviour of users in the social networking environment. We have so many opportunities and challenges to analyze the behaviour on a large scale. A so...
An innovative Accession intended for FEC Decryption predicated on the BP Contrivance in LTE as well as WiMAX Conformity
Abstract—Numerous wireless contact systems such as IS-54, superior data tariff for the GSM succession (EDGE), universal interoperability for microwave access (WiMAX) and long term progression (LTE) have adopted low-densi...
Power Optimized MAC Protocol in Ad-Hoc Network’s
Wireless hosts are usually powered by batteries which provide a limited amount of energy. Therefore, techniques to reduce energy consumption are of interest. One way to conserve energy is to use power saving mech...
Design of RC5 Algorithm using Pipelined Architecture
Data transmission through a channel requires more security, so security gaining is more importance than simply transmission. In this document RC5 algorithm is used for encryption and decryption of data to have secu...