Search
Now showing items 1-3 of 3
Protecting mobile agents against malicious hosts using trusted computing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed ...
Contributions to parasitic computing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
Internet is a huge connection of networks. To ensure reliable communication on the Internet a layered architecture is used, with various protocols functional at each layer. The way these protocols are used on the Internet, ...
Protecting structures on heap from buffer overflow vulnerabilities with TIED-LibsafePlus
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
In spite of the numerous defenses that have been devised to combat the buffer overflow attack, buffer overflow vulnerability in the C programs still exist as the one widely exploited by the attackers to subsume the privileges ...