A novel algorithm to protect and manage memory locations
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Most of security vulnerabilities continue to be caused by memory errors, and long-running programsthat interact with untrusted components. While comprehensive solutions have been developed to handle memoryerrors, these solutions suffer from one or more of the following problems: high overheads, incompatibility, andchanges to the memory model. Address space randomization is a technique that avoids these drawbacks, but donot offer a level of protection. To overcome these limitations, we develop a new approach in this paper thatsupports comprehensive randomization, whereby the absolute locations of all (code and data) objects, as well astheir relative distances are randomized. In particular, we have successfully deployed precise method in theimplementation of a language run-time system. Our approach is implemented as a fully automatic source-tosourcetransformation, the address-space randomizations take place at load-time or runtime, so the same copyof the binaries can be distributed to everyone - this ensures compatibility with today's software distributionmodel.
Authors and Affiliations
Buthainah F. AL-Dulaimi, Sawsan H. Jaddoa
Storage Data Security of Data in Cloud Computing
Abstract: Cloud Computing refers to the many different types of services and applications being delivered in the internet cloud, and the fact that, in many cases, the devices used to access these services and appli...
Accident Detection and Surveillance System using Wireless Technologies
Abstract: The symbiosis between communication technologies and vehicles offers opportunity to improve assistance to people injured in traffic accidents, by providing information about the accident to reduce the res...
Detection of Network Intrusion and Countermeasure Selection in Cloud Systems
Abstract: In Cloud Server Systems, The detection of zombie in virtual machine is considered as the security threat exploration attacks is extremely difficult, due to this the cloud user can able to install harmful...
A Hybrid Approach for Performance Enhancement of VANETusing CSMA-MACA: a Review
Abstract: A wireless sensor network (WSNs) have increased gigantic consideration for their extensive varietyof utilization, for example, environmental checking, military consideration, medical services, fiascoadmin...
Sketch Based Image Indexing and Retrieval
Abstract : Content based image retrieval (CBIR) is the technology widely used in present era. The main purpose of the CBIR based systems is to excerpt visual features of an image like color, texture, shape or any combina...