A novel algorithm to protect and manage memory locations

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3

Abstract

 Abstract: Most of security vulnerabilities continue to be caused by memory errors, and long-running programsthat interact with untrusted components. While comprehensive solutions have been developed to handle memoryerrors, these solutions suffer from one or more of the following problems: high overheads, incompatibility, andchanges to the memory model. Address space randomization is a technique that avoids these drawbacks, but donot offer a level of protection. To overcome these limitations, we develop a new approach in this paper thatsupports comprehensive randomization, whereby the absolute locations of all (code and data) objects, as well astheir relative distances are randomized. In particular, we have successfully deployed precise method in theimplementation of a language run-time system. Our approach is implemented as a fully automatic source-tosourcetransformation, the address-space randomizations take place at load-time or runtime, so the same copyof the binaries can be distributed to everyone - this ensures compatibility with today's software distributionmodel.

Authors and Affiliations

Buthainah F. AL-Dulaimi, Sawsan H. Jaddoa

Keywords

Related Articles

 Reduce the False Positive and False Negative from Real Trafficwith Intrusion Detection in Zigbee Wireless Networks

 Abstract: Denial-of-Service attack in particular is a threat to zigbee wireless networks. It is an attack in whichthe primary goal is to deny the legitimate users access to the resources. A node is prevented from r...

 Security Issues in Next Generation IP and Migration Networks

 Abstract: As networks are mushrooming, the growth and development of IPv6 is gaining more importance. Thewide scale deployment of this protocol into operational networks raises certain issues with security being on...

Video Steganography: A Survey

Abstract: Recent advances in information technology have made quick delivery and sharing of multimedia information possible. But these advances in technology are leading breaches to information security and personal info...

A Survey on Routing Protocols influencing Mobile Sink in enhancing life time of WSN for Data gathering

Abstract: Wireless Sensor Network is a group of specialized sensors have the ability to sense, monitor, communicate to the neighbors and recording conditions at assorted locations such as temperature, sound, pressure, se...

A Critical Appraisal of e-Governance Service with special reference to Rajasthan Land Records

Abstract: Over the years, with influx of e-Governance movement in India, numerous ingenious initiatives have been conceptualized to strengthen ICT services in the country and to channelize the changes enabling technology...

Download PDF file
  • EP ID EP137638
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

Buthainah F. AL-Dulaimi, Sawsan H. Jaddoa (2015).  A novel algorithm to protect and manage memory locations. IOSR Journals (IOSR Journal of Computer Engineering), 17(3), 82-88. https://europub.co.uk/articles/-A-137638