Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/649
Title: | PRIORITIZED RUNTIME ADDRESS RANDOMIZATION FOR BUFFER OVERFLOW EXTENUATION |
Authors: | AGARWAL, RAHUL KUMAR |
Keywords: | prophylactic security technique RANDOMIZATION |
Issue Date: | 18-Jul-2008 |
Series/Report no.: | TD439;67 |
Abstract: | Today a majority of security exploits have a memory corruption component. These attacks depend on corrupting some process memory and either injecting a shellcode and executing that or using some system calls with malicious parameters to harm victim machine and to replicate. The existing approaches either provide insufficient randomness or require source code modification. Insufficient randomness allows attacker to use Brute-Force attacks and source code modification doesn’t seem to be viable solution for all the software available on the internet which are the biggest reservoir of the memory corruption attacks. In this paper we propose PriCryp, a prophylactic security technique that makes efficient and effective use of ASLR and ISR to provide prioritized cryptographic runtime code block randomization. Here we make key observation that system calls are almost always used in memory corruption attacks by the attackers. We make use of cryptographic algorithms to scramble data var... |
Description: | ME THESIS |
URI: | http://dspace.dtu.ac.in:8080/jspui/handle/repository/649 |
Appears in Collections: | M.E./M.Tech. Computer Technology & Applications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Rahul+Kumar+Agrawal+-+10193+-+14CTA06.pdf | 1.39 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.