A novel algorithm to protect and manage memory locations

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3

Abstract

 Abstract: Most of security vulnerabilities continue to be caused by memory errors, and long-running programsthat interact with untrusted components. While comprehensive solutions have been developed to handle memoryerrors, these solutions suffer from one or more of the following problems: high overheads, incompatibility, andchanges to the memory model. Address space randomization is a technique that avoids these drawbacks, but donot offer a level of protection. To overcome these limitations, we develop a new approach in this paper thatsupports comprehensive randomization, whereby the absolute locations of all (code and data) objects, as well astheir relative distances are randomized. In particular, we have successfully deployed precise method in theimplementation of a language run-time system. Our approach is implemented as a fully automatic source-tosourcetransformation, the address-space randomizations take place at load-time or runtime, so the same copyof the binaries can be distributed to everyone - this ensures compatibility with today's software distributionmodel.

Authors and Affiliations

Buthainah F. AL-Dulaimi, Sawsan H. Jaddoa

Keywords

Related Articles

 Storage Data Security of Data in Cloud Computing

 Abstract: Cloud Computing refers to the many different types of services and applications being delivered in the internet cloud, and the fact that, in many cases, the devices used to access these services and appli...

 Accident Detection and Surveillance System using Wireless Technologies

 Abstract: The symbiosis between communication technologies and vehicles offers opportunity to improve assistance to people injured in traffic accidents, by providing information about the accident to reduce the res...

 Detection of Network Intrusion and Countermeasure Selection in Cloud Systems

 Abstract: In Cloud Server Systems, The detection of zombie in virtual machine is considered as the security threat exploration attacks is extremely difficult, due to this the cloud user can able to install harmful...

 A Hybrid Approach for Performance Enhancement of VANETusing CSMA-MACA: a Review

 Abstract: A wireless sensor network (WSNs) have increased gigantic consideration for their extensive varietyof utilization, for example, environmental checking, military consideration, medical services, fiascoadmin...

Sketch Based Image Indexing and Retrieval

Abstract : Content based image retrieval (CBIR) is the technology widely used in present era. The main purpose of the CBIR based systems is to excerpt visual features of an image like color, texture, shape or any combina...

Download PDF file
  • EP ID EP137638
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

Buthainah F. AL-Dulaimi, Sawsan H. Jaddoa (2015).  A novel algorithm to protect and manage memory locations. IOSR Journals (IOSR Journal of Computer Engineering), 17(3), 82-88. https://europub.co.uk/articles/-A-137638