Automatic Patch Generation for Control Hijacking Attacks

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

"With the number of solutions proposed to provide an adequate protection against overflow attacks, integer overflow still pose a significant threat to security and availability of today’s computing environments. Most of the existing solutions terminate the vulnerable program when the overflow occurs, rendering the program unavailable and leading to denial of service. The impact on system availability is a serious problem on service orientated platforms. We will provide a solution that will automatically diagnose and patch any suspicious integer input that will lead to overflowing the values and causing further threats to possible buffer overflow in the system. The key idea of our solution is to virtualized memory accesses and moves the vulnerable buffer into protected memory regions, which provides a fundamental and effective protection against recurrence of the same attack without stopping the normal system execution. "

Authors and Affiliations

Keywords

Related Articles

Development the Prototype of Merry Go Round Pump

To Date, the consumption rate of electricity balances the generation rate. The generation of electricity can be done in many ways, like using the natural resources and artificial made equipments. The natural resources ar...

Studies on Diethanolaminedithiocarbamate as Metal Complex, Complexing Agent and Stabilizer in Copper Methanesulphonate Bath

"Abstract We report a study on the use of diethanolaminedithiocarbamate (DEADTC) as complexing agent during electroless deposition of copper. For this, we study the nature and structure of the coordination complex betw...

A Rare Case of Tabetic Arthropathy Knee Treated with Ilizarov’s Technique

We present a case of tabetic arthropathy of left knee which was presented to the department as a case of repetitive knee effusion. After thorough investigation and planning, we have tried arthrodesis with ilizarov’s tech...

Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems

In past few years, Web has huge impact on distributed computing. The provisioning of fundamental security mechanisms like authentication and confidentiality for Sender/Receiver System is exceptionally difficult. Authenti...

Os Trigonum - A Case Report Rosemol Xaviour

Os Trigonum - A Case Report Rosemol Xaviour

Download PDF file
  • EP ID EP357622
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

(2015). Automatic Patch Generation for Control Hijacking Attacks. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357622