Another research collaboration between an academic and an MSc Computing student.
Mahmood, J. K. and Opoku Agyeman, M. (2018) An overview of prevention/mitigation against memory corruption attack. In: International Symposium on Computer Science and Intelligent Control. Sweden: ISCSIC.
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defense techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.
To find out more go to http://nectar.northampton.ac.uk/10368/
To find out more about the MSc Computing Courses go to:
MSc Computing
MSc Computing (Software Engineering)
MSc Computing (Internet Technology and Security)
MSc Computing (Computer Networks Engineering)
All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with. Twitter: @scottturneruon
No comments:
Post a Comment