Automatic Patch Generation for Control Hijacking Attacks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 4 Issue 3, March 2015

Automatic Patch Generation for Control Hijacking Attacks

Saud Adam Abdulkadir, Savaridassan P.

With the number of solutions proposed to provide an adequate protection against overflow attacks, integer overflow still pose a significant threat to security and availability of todays computing environments. Most of the existing solutions terminate the vulnerable program when the overflow occurs, rendering the program unavailable and leading to denial of service. The impact on system availability is a serious problem on service orientated platforms. We will provide a solution that will automatically diagnose and patch any suspicious integer input that will lead to overflowing the values and causing further threats to possible buffer overflow in the system. The key idea of our solution is to virtualized memory accesses and moves the vulnerable buffer into protected memory regions, which provides a fundamental and effective protection against recurrence of the same attack without stopping the normal system execution.

Keywords: Software Security, Integer Overflow Attacks Prevention, Vulnerability Patching

Edition: Volume 4 Issue 3, March 2015

Pages: 2100 - 2103

Share this Article

How to Cite this Article?

Saud Adam Abdulkadir, Savaridassan P., "Automatic Patch Generation for Control Hijacking Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152527, Volume 4 Issue 3, March 2015, 2100 - 2103

124 PDF Views | 90 PDF Downloads

Download Article PDF



Top