Automatic Patch Generation for Control Hijacking Attacks
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : Saud Adam Abdulkadir; Savaridassan P.;
Page : 2100-2103
Keywords : Software Security; Integer Overflow Attacks Prevention; Vulnerability Patching;
Abstract
With the number of solutions proposed to provide an adequate protection against overflow attacks, integer overflow still pose a significant threat to security and availability of todays computing environments. Most of the existing solutions terminate the vulnerable program when the overflow occurs, rendering the program unavailable and leading to denial of service. The impact on system availability is a serious problem on service orientated platforms. We will provide a solution that will automatically diagnose and patch any suspicious integer input that will lead to overflowing the values and causing further threats to possible buffer overflow in the system. The key idea of our solution is to virtualized memory accesses and moves the vulnerable buffer into protected memory regions, which provides a fundamental and effective protection against recurrence of the same attack without stopping the normal system execution.
Other Latest Articles
- Neglected Congenital Pseudarthrosis of the Tibia in an Adult Treated by Deformity Correction and limb Lengthening using Ilizarov Ring Fixator
- A Review on Power Quality Improvement by UPQC
- Effect of Electromagnetic Field Due to Radar System in Human Body
- Application of Six Sigma Tool for Quality Improvement - A Case Study in Manufacturing Industry
- Using Revenue Management in Multiproduct Production-Inventory Systems
Last modified: 2021-06-30 21:34:49