Show simple item record

dc.contributor.advisorMathuria, Anish M.
dc.contributor.authorShah, Tejaskumar
dc.date.accessioned2017-06-10T14:37:29Z
dc.date.available2017-06-10T14:37:29Z
dc.date.issued2008
dc.identifier.citationShah, Tejaskumar (2008). Improvement of tagged architecture for preventing software vulnerabilities. Dhirubhai Ambani Institute of Information and Communication Technology, ix, 101 p. (Acc.No: T00165)
dc.identifier.urihttp://drsr.daiict.ac.in/handle/123456789/202
dc.description.abstractIn spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to programming mistakes which allows security bugs to be exploited. Buffer overflow occurs when buffer is given more data than the capacity of it. Format string vulnerability arises when data supplied by attacker is passed to formatting functions as format string argument. Integer vulnerability occurs when program evaluates an integer to unexpected value due to integer overflows, underflows, truncation errors or signed conversion errors. The hardware based solution called tagged architecture protects a system against mentioned vulnerabilities. In tagged architecture, each memory byte is appended with one tag bit to mark data that comes from I/O. Whenever I/O supplied data is used to transfer control of a system or to access memory, an alert is raised and program is terminated. This thesis proposes a weakness of tagged architecture by finding false positives and false negatives on it. It also proposes the improvements to the tagged architecture to avoid found false positives on it. The prototype implementation of improved tagged architecture is done in SimpleScalar simulator. The SimpleScalar simulator is a architectural simulator. The security evaluation is done for tagged architecture and improved tagged architecture through benchmarks and synthetic vulnerable programs.
dc.publisherDhirubhai Ambani Institute of Information and Communication Technology
dc.subjectComputer architecture
dc.subject|Computer security
dc.subjectComputer software
dc.subjectDevelopment
dc.subjectSecurity measures
dc.subjectComputer software
dc.subjectTesting
dc.subjectComputer software
dc.subjectReliability
dc.classification.ddc005.8 SHA
dc.titleImprovement of tagged architecture for preventing software vulnerabilities
dc.typeDissertation
dcterms.subjectTagged architecture
dc.degreeM. Tech
dc.student.id200611028
dc.accession.numberT00165


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record