Automatic Patch Generation for Control Hijacking Attacks

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

"With the number of solutions proposed to provide an adequate protection against overflow attacks, integer overflow still pose a significant threat to security and availability of today’s computing environments. Most of the existing solutions terminate the vulnerable program when the overflow occurs, rendering the program unavailable and leading to denial of service. The impact on system availability is a serious problem on service orientated platforms. We will provide a solution that will automatically diagnose and patch any suspicious integer input that will lead to overflowing the values and causing further threats to possible buffer overflow in the system. The key idea of our solution is to virtualized memory accesses and moves the vulnerable buffer into protected memory regions, which provides a fundamental and effective protection against recurrence of the same attack without stopping the normal system execution. "

Authors and Affiliations

Keywords

Related Articles

Study the Heavy Metal Accumulated Pithophora Algal Compost Nutrient Content, Heavy Metals and Biogas Production

Cyanophyceaen algae as nitrogen fixers have been used in different countries for a long time, are well known as biofertilizers. The potentialities of cyanobacteria to fix atmospheric nitrogen excrete a great number of su...

Deployment Architecture of the Various classes for Advanced metering systems

Deployment Architecture of the Various classes for Advanced metering systems

A Study to Assess the Level of Burden, Coping Methods and Quality of Life Among Primary Care Givers of Selected Mentally Ill Patients in a Selected Clinic at Salem, Tamil Nadu, India

: Background: Mental illness in a family member affects the family in different ways especially the primary caregiver’s life. This study aimed to assess the level of burden, coping methods and quality of life among prima...

Efficient Flow Marking IP Traceback System

"— For controlling the offense on internet the Internet Protocol (IP) traceback technology is used. In this paper we represents a novel and practical IP trace back system, known as Efficient Flow Marking (EFM) for gettin...

PDOC in Location – Based Social Networks

Now a days the usage of social network such as facebook , flicker increases day by day. Most of the social networking sites supports Location Based Services(LBS). Location based social network used to identify the friend...

Download PDF file
  • EP ID EP357622
  • DOI -
  • Views 76
  • Downloads 0

How To Cite

(2015). Automatic Patch Generation for Control Hijacking Attacks. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357622