2,226 results on '"buffer overflow"'
Search Results
152. Quality-Adaptive Testing: A Strategy for Testing with Focusing on Where Bugs Have Been Detected
- Author
-
Nishi, Yasuharu, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Kontio, Jyrki, editor, and Conradi, Reidar, editor
- Published
- 2002
- Full Text
- View/download PDF
153. Learning Unknown Attacks — A Start
- Author
-
Just, James E., Reynolds, James C., Clough, Larry A., Danforth, Melissa, Levitt, Karl N., Maglich, Ryan, Rowe, Jeff, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Wespi, Andreas, editor, Vigna, Giovanni, editor, and Deri, Luca, editor
- Published
- 2002
- Full Text
- View/download PDF
154. An Integrated Push/Pull Buffer Management Method in Multimedia Communication Environments
- Author
-
Lee, Sungyoung, Woo Seung, Hyon, Woong Jeon, Tae, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Davidson, Jack, editor, and Min, Sang Lyul, editor
- Published
- 2001
- Full Text
- View/download PDF
155. Singular Controls
- Author
-
Kushner, Harold J., Karatzas, I., editor, Yor, M., editor, and Kushner, Harold J.
- Published
- 2001
- Full Text
- View/download PDF
156. 一种抗地址淹没的缓冲区栈溢出算法.
- Author
-
唐成华, 彭 灿, 刘 猛, and 钱俊彦
- Abstract
Buffer overflow is common network vulnerability .and the most important one is the stack overflow attack. By analyzing the methods and characteristics of buffer overflow attacks,this paper proposed an improved RetProtect algorithm based on StaekShield. This algorithm used IDA Pro for the disassembly analysis of the source program,and then established a new library function. It detected the occurrence of buffer overflow attacks by modifying the GCC source code to realize the backup of the function return address when the program executed. Compared with other stack overflow attack detection methods,the RetProtect algorithm can effectively prevent the stack overflow attacks on the return address overlay, which is transparent to the user and good compatibility. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
157. An Efficient Approach for Storage Balancing in Wireless Sensor Networks.
- Author
-
Ez-Zaidi, Asmaa and Rakrak, Said
- Subjects
MULTISENSOR data fusion ,WIRELESS sensor networks ,PROTOCOL analyzers ,DISTRIBUTED databases ,CONTEXT-aware computing - Abstract
The use of mobile sinks in data collection has received much attention in recent years. In fact, mobility was introduced to solve problems that occur in data gathering with static sink such as hotspots, quick energy depletion of sensor nodes and so on. Using a mobile sink provides an effective mechanism to improve reliability, security as well as connectivity within the network. Nevertheless, the sink's mobility poses new challenges, especially when the sink follows an unpredictable movement while gathering data. In this case, the network will experience huge latency and suffer from significant packet loss particularly when sensor nodes do not have enough memory storage to buffer collected data between two consecutive visits of the mobile sink. In this paper we propose a new approach in which sensor nodes cooperate to manage the storage and prevent packet drops. When a node's memory is almost full, it offloads its data to its neighbor nodes in function of their free spaces. In case there are no suitable neighbor nodes with sufficient storage space, the sink is urgently notified about the overloaded region that needs to be rapidly dumped. Simulation results reveal that our proposed approach balances the storage load and decreases drastically packet loss. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
158. Stepwise Adjustment of Constrained Application Protocol Observing Period for Internet of Things Applications Using Wireless Sensor Networks.
- Author
-
Jung-Hyok Kwon, Sungmo Kim, and Eui-Jik Kim
- Subjects
INTERNET of things ,WIRELESS sensor networks ,COMPUTER networks ,QUEUEING networks ,BUFFER storage (Computer science) - Abstract
In this paper, we present a stepwise adjustment of the constrained application protocol observing period (SACOP) for Internet of Things (IoT) applications using wireless sensor networks (WSNs), which dynamically adjust observing periods depending on the Rx queue status of the constrained application protocol (CoAP) client. The operation of SACOP consists of the following two consecutive phases: overflow alert and observing period adjustment. In the former phase, a client sends a buffer overflow alert when the queue of the client reaches the predefined queue threshold. In the latter phase, the servers change their own observing period level depending on whether or not they receive a buffer overflow alert message. Therefore, SACOP can significantly reduce the number of dropped messages caused by buffer overflow. A simulation showed that SACOP achieved a higher network performance than the legacy approach with regard to the number of dropped messages. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
159. Superframe Duration Allocation Schemes to Improve the Throughput of Cluster-Tree Wireless Sensor Networks.
- Author
-
Leão, Erico, Montez, Carlos, Moraes, Ricardo, Portugal, Paulo, and Vasques, Francisco
- Subjects
- *
WIRELESS sensor networks , *ZIGBEE , *AUTOMATION , *WIRELESS sensor nodes , *CLUSTER analysis (Statistics) - Abstract
The use of Wireless Sensor Network (WSN) technologies is an attractive option to support wide-scale monitoring applications, such as the ones that can be found in precision agriculture, environmental monitoring and industrial automation. The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable topology to build wide-scale WSNs. Despite some of its known advantages, including timing synchronisation and duty-cycle operation, cluster-tree networks may suffer from severe network congestion problems due to the convergecast pattern of its communication traffic. Therefore, the careful adjustment of transmission opportunities (superframe durations) allocated to the cluster-heads is an important research issue. This paper proposes a set of proportional Superframe Duration Allocation (SDA) schemes, based on well-defined protocol and timing models, and on the message load imposed by child nodes (Load-SDA scheme), or by number of descendant nodes (Nodes-SDA scheme) of each cluster-head. The underlying reasoning is to adequately allocate transmission opportunities (superframe durations) and parametrize buffer sizes, in order to improve the network throughput and avoid typical problems, such as: network congestion, high end-to-end communication delays and discarded messages due to buffer overflows. Simulation assessments show how proposed allocation schemes may clearly improve the operation of wide-scale cluster-tree networks. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
160. The Flow Control Problem for ABR Traffic
- Author
-
Kesidis, George and Kesidis, George
- Published
- 2000
- Full Text
- View/download PDF
161. Stacy-static code analysis for enhanced vulnerability detection
- Author
-
Pankaj Lathar, Raunak Shah, and Srinivasa K G
- Subjects
static analysis ,control flow graph ,uninitialized variables ,buffer overflow ,memory leaks ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Computer program analysis refers to the automatic analysis of the behavior of a user defined program. An application of program analysis is to determine the quality of source code. Humans are prone to errors and, in most cases, the penalty of deploying low quality code is very high for a large organization. These errors often give rise to potential security vulnerabilities in an application, which could be exploited by malicious users. In this paper, we present Stacy—a tool that statically detects potential security vulnerabilities present in input source code. Static program analysis is the examination of source code prior to its execution. Our tool attempts to predict the behavior of a program before it is deployed. Stacy uses novel techniques to detect the primary sources of vulnerability in the source code of a program and informs the developer.
- Published
- 2017
- Full Text
- View/download PDF
162. A Flow Control Scheme Based on Per Hop and Per Flow in Commodity Switches for Lossless Networks
- Author
-
Hsien-Chueh Hsieh, Shie-Yuan Wang, Yi-Bing Lin, Ruei-Syun Lai, and Yo-Ru Chen
- Subjects
PFC ,Flow control (data) ,Scheme (programming language) ,Lossless compression ,General Computer Science ,Computer science ,business.industry ,General Engineering ,P4 ,Deadlock ,TK1-9971 ,Flow control ,Packet loss ,IEEE 802.1Qbb ,Bandwidth (computing) ,Overhead (computing) ,General Materials Science ,IEEE 802.3x ,Electrical engineering. Electronics. Nuclear engineering ,business ,computer ,Computer network ,Buffer overflow ,computer.programming_language - Abstract
Performing flow control inside a network can effectively avoid packet loss due to buffer overflow in switches. IEEE 802.3x exercises a per-hop link-based flow control scheme to achieve this goal. IEEE 802.1Qbb Priority-based Flow Control (PFC) improves IEEE 802.3x by proposing a per-hop per-service-class flow control scheme. Although PFC is better than IEEE 802.3x, it still suffers from several serious problems such as congestion spreading, deadlock, and packet loss. In this work, we propose a per-hop per-flow scheme to mitigate these problems. We design, implement, and evaluate the performance of our scheme in P4 hardware switches. Experimental results show that (1) our scheme outperforms PFC in many aspects including avoiding congestion spreading, deadlock, and packet loss, and (2) the bandwidth overhead of our scheme is only slightly higher than that of PFC.
- Published
- 2021
- Full Text
- View/download PDF
163. Frame Control-Based Terrestrial UHD (ATSC 3.0) Buffer Model for Dynamic Content Insertion
- Author
-
Jun-Sik Kim, Sang Jin Kim, Doug Young Suh, Kyuheon Kim, and Seonghwan Park
- Subjects
General Computer Science ,Computer science ,business.industry ,Frame (networking) ,General Engineering ,020206 networking & telecommunications ,DASH ,UHD broadcasting ,02 engineering and technology ,ATSC 3.0 ,Broadcasting ,Telecommunications network ,content insertion ,TK1-9971 ,Rendering (computer graphics) ,advertisement insertion ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,The Internet ,Electrical engineering. Electronics. Nuclear engineering ,Data as a service ,business ,Heterogeneous network ,Buffer overflow ,Computer network - Abstract
Hybrid broadcasting utilizing heterogeneous networks can provide not only Audio/Video(A/V)-based unidirectional broadcast services but also various interactive A/V and data services via both broadcast and communication networks. Customers of hybrid broadcasting services can then consume A/V content that is transmitted from broadcasting stations and data services relevant to A/V content through communication networks, such as the Internet. Since interactive data can be widely ingested in various countries and regions, it is advantageous for it to be customized for personalized services depending on consumer preferences and locations. However, the current broadcasting standard has not yet defined a standardized method of inserting content into a broadcasting program. Thus, the research on content insertion technology using heterogeneous networks is actively progressing. The most important technical challenge of inserting content is rendering a smooth replacement of on-air broadcast content with media data through communication networks and an accurate return to the over-the-air broadcast content consistent with the rendering timeline using legacy receivers. Since most legacy receivers have one decoder, both the inserted content and the broadcast content have to be handled by one decoder. When two video streams are processed by one decoder, decoding and rendering problems due to the buffer overflow may occur, and buffer management of the decoder is required to solve this problem. Therefore, this paper proposes a content insertion method of using a frame control-based receiver buffer model to enable smooth and accurate rendering of inserted and on-air content without any blackout scenes.
- Published
- 2021
- Full Text
- View/download PDF
164. Taxonomy of Various Attacks
- Author
-
Ashley, Paul, Vandenwauver, Mark, Ashley, Paul, and Vandenwauver, Mark
- Published
- 1999
- Full Text
- View/download PDF
165. Hardware Assisted Buffer Protection Mechanisms for Embedded RISC-V
- Author
-
Asmit De, Trent Jaeger, Swaroop Ghosh, and Aditya Basu
- Subjects
Multi-core processor ,Coprocessor ,Computer science ,Processor register ,business.industry ,Physical unclonable function ,Code reuse ,02 engineering and technology ,Computer Graphics and Computer-Aided Design ,Execution time ,020202 computer hardware & architecture ,Embedded system ,RISC-V ,0202 electrical engineering, electronic engineering, information engineering ,Code injection ,Electrical and Electronic Engineering ,business ,Software ,Buffer overflow - Abstract
RISC-V is a promising open-source architecture that targets low-power embedded devices and system-on-chips (SoCs). However, there is a dearth of practical and low-overhead security solutions in the RISC-V architecture. Programs compiled using RISC-V toolchains are still vulnerable to code injection and code reuse attacks, such as buffer overflow and return-oriented programming (ROP). In this article, we propose two hardware-implemented security extensions to RISC-V that provides a defense mechanism against such attacks. We first employ a physically unclonable function (PUF)-based randomized canary generation technique that removes the need to store the sensitive canary words in memory or CPU registers, thereby being more secure, while incurring low overheads. We implement the proposed Canary Engine in RISC-V RocketChip with rocket custom coprocessor (RoCC). The simulation results show 2.2% average execution overhead with a single buffer protection, while a $10\times $ increase in buffer count only increases the overhead by $1.5\times $ when protection is extended to all buffers. We further improve upon this with a dedicated security coprocessor flow integrity extensions for embedded RISC-V (FIXER), implemented on the RoCC. FIXER enforces fine-grained control-flow integrity (CFI) of running programs on backward edges (returns) and forward edges (calls) without requiring any architectural modifications to the processor core. Compared to software-based solutions, FIXER reduces energy overhead by 60% at minimal execution time (1.5%) and area (2.9%) overheads.
- Published
- 2020
- Full Text
- View/download PDF
166. On Detecting Code Reuse Attacks
- Author
-
Yury V. Kosolapov
- Subjects
021110 strategic, defence & security studies ,business.industry ,Computer science ,Code reuse ,0211 other engineering and technologies ,02 engineering and technology ,computer.file_format ,Reuse ,Software ,Control and Systems Engineering ,Embedded system ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Information system ,x86 ,020201 artificial intelligence & image processing ,Executable ,business ,computer ,Buffer overflow - Abstract
Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow. These attacks bypass the protection against execution of code in the stack, which is implemented on the hardware and software levels in modern information systems. The attacks are based on finding suitable sections of executable code–gadgets–in the vulnerable program and linking these gadgets into chains. The article proposes a method to protect applications against code reuse attacks. The method is based on detecting properties that distinguish between chains of gadgets and typical chains of legitimate program basic blocks. The appearance of an atypical chain of basic blocks during program execution may indicate the execution of a malicious code. One of the properties of a chain of gadgets is that at the end of the chain a special processor instruction used to call a function of the operating system is executed. Experiments are carried out for the x86/64 Linux operating system which show the importance of this property for detecting malicious code execution. An algorithm for identifying atypical chains is developed which makes it possible to detect all currently known code reuse techniques.
- Published
- 2020
- Full Text
- View/download PDF
167. Adaptive Channel Selection and Transmission Timing Control for Simultaneous Receiving and Sending in Relay-Based UAV Network
- Author
-
Nei Kato, Yuichi Kawamoto, and Ayaka Hanyu
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Frame (networking) ,020302 automobile design & engineering ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Computer Science Applications ,law.invention ,0203 mechanical engineering ,Transmission (telecommunications) ,Control and Systems Engineering ,Relay ,law ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Transmission time ,business ,Computer network ,Communication channel ,Buffer overflow - Abstract
Recently, the demand for technology that can wirelessly transmit images taken by unmanned aerial vehicles (UAVs) has increased. Relay transmission technology is attracting particular attention, as it can provide wireless transmission to remote locations even in environments lacking infrastructure. Here, we focus on further developing an existing relay transmission system, namely, the simultaneous reception and transmission method, using multiple frequency bands. In this method, a relay node receives data from a source node and simultaneously transmits data to a destination node using another channel. This technology has the advantages of high frequency utilization efficiency and a short transmission time; however, buffer overflow at the relay node may remain, which could contribute to video quality degradation. Thus, we propose a buffer control method involving two proposed elements: a channel selection method, and a transmission start timing control method. By applying these two methods, we show that the buffer overflow rate at the relay node is decreased, and the amount of data that can be received by the destination node is maximized within the assigned sub frame. Ultimately, these results can contribute to improving the quality of videos transmitted in real-time using relay transmission with UAVs.
- Published
- 2020
- Full Text
- View/download PDF
168. A frame-level MLP-based bit-rate controller for real-time video transmission using VVC standard
- Author
-
Mohammad Reza Salehi, Ebrahim Abiri, and Farhad Raufmehr
- Subjects
Arithmetic underflow ,Artificial neural network ,Computer science ,Quantization (signal processing) ,020207 software engineering ,02 engineering and technology ,Perceptron ,Buffer (optical fiber) ,Computer graphics ,Control theory ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Information Systems ,Coding (social sciences) ,Buffer overflow - Abstract
Real-time video transmission is one of the most popular applications that are included in the versatile video coding (VVC) standard. However, real-time applications are encountered with practical limitations, including the buffer size and available bandwidth. In these applications, the buffer overflow and underflow should be strictly prevented and also the bit-rate fluctuation should be suppressed. In this paper, a video bit-rate controller is proposed that completely conforms with the constraints of real-time applications. The proposed controller is based on a multi-layer perceptron (MLP) neural network which estimates the proper quantization parameter (QP) modification at the frame level. The buffer occupancy is directly included in the QP derivation process for robust buffer control. Experimental results show that the proposed bit-rate controller fulfils the buffering constraints and controls the bit-rate accurately. The average bit-rate error of the proposed method is 0.29% while providing a low initial buffering delay of about 0.21 s. Also, the rate-distortion analysis shows that the performance of the proposed method is close to those of the conventional algorithms.
- Published
- 2020
- Full Text
- View/download PDF
169. Cooperative Network Model for Joint Mobile Sink Scheduling and Dynamic Buffer Management Using Q-Learning
- Author
-
Rajesh M. Hegde and Surender Redhu
- Subjects
Job shop scheduling ,Computer Networks and Communications ,business.industry ,Computer science ,Q-learning ,020206 networking & telecommunications ,02 engineering and technology ,Dynamic priority scheduling ,Scheduling (computing) ,Home automation ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Computer network ,Buffer overflow ,Network model - Abstract
Development of energy-efficient wireless sensor networks is crucial in the deployment of IoT and IIoT for modern day applications like smart home, smart vehicles, and smart industries. Several methods like network clustering, mobile sink deployment and dynamic sensing rate have been used in improving the energy-efficiency of wireless sensor networks in IoT framework. However, these methods have been developed independently which can lead to certain network issues like reduced lifetime, network breakdown among others. In this work, an energy-efficient method that optimizes mobile sink scheduling while concurrently providing dynamic buffer management is proposed. A cooperative network model that incorporates node clustering and mobile sink deployment in variable node sensing rate scenario is first developed. However, in such cooperative network models, mobile sink scheduling and buffer overflow management which causes information loss become challenging. This is primarily due to limited buffer size, variable sensing rate of the nodes, and the unavailability of mobile sink at all times near a cluster. Therefore, a reinforcement Q-learning framework is developed for scheduling the mobile sink while minimizing the information loss caused by buffer overflow in each cluster of a clustered WSN. More specifically, the network behaviour is learnt in the context of buffer overflow using Q-learning approach. The proposed method computes the adaptive halt-times for the mobile sink based on information loss and buffer overflow in each cluster. Performance of the proposed joint mobile sink scheduling and dynamic buffer management method is evaluated on a medium scale WSN. A clustered wireless sensor network with a total of 600 sensor nodes is considered for performance evaluation. The proposed method is shown to learn the variable node sensing rate in a reasonable amount of time using convergence analysis. Numeric evaluations indicate that the proposed method minimizes the information loss in a medium scale wireless sensor network while improving the network lifetime simultaneously. The proposed cooperative network model also outperforms in terms of energy-efficiency when compared to conventional WSN. The results are motivating enough for the use of cooperative network model in practical WSNs for IoT applications.
- Published
- 2020
- Full Text
- View/download PDF
170. Analysis of an M/PH/1 Retrial Queueing-Inventory System with Level Dependent Retrial Rate
- Author
-
Xuxiang Luo, Zaiming Liu, and Jinbiao Wu
- Subjects
0209 industrial biotechnology ,Queueing theory ,Mathematical optimization ,021103 operations research ,Exponential distribution ,Article Subject ,General Mathematics ,0211 other engineering and technologies ,General Engineering ,Joins ,02 engineering and technology ,Engineering (General). Civil engineering (General) ,Stability (probability) ,Probability vector ,Moment (mathematics) ,020901 industrial engineering & automation ,QA1-939 ,Phase-type distribution ,TA1-2040 ,Mathematics ,Buffer overflow - Abstract
We analyze a queueing-inventory system which can model airline and railway reservation systems. An arriving customer to an idle server joins for service immediately with exactly one item from inventory at the moment of service completion if there are some on-hand inventory, or else he accesses to a buffer of varying size (the buffer capacity varies and equals to the number of the items in the inventory with maximum size S). When the buffer overflows, the customer joins an orbit of infinite capacity with probability p or is lost forever with probability 1−p. Arrivals form a Poisson process, and service time has phase type distribution. The time between any two successive retrials of the orbiting customer is exponentially distributed with parameter depending on the number of customers in the orbit. In addition, the items have a common life time with exponentially distributed. Cancellation of orders is possible before their expiry and intercancellation times are assumed to be exponentially distributed. The stability condition and steady-state probability vector have been studied by Neuts–Rao truncation method using the theory of Level Dependent Quasi-Birth-Death (LDQBD) processes. Several stationary performance measures are also computed. Furthermore, we provide numerical illustration of the system performance with variation in values of underlying parameters and analyze an optimization problem.
- Published
- 2020
- Full Text
- View/download PDF
171. Mitigating congestion in wireless sensor networks through clustering and queue assistance: a survey
- Author
-
Saneh Lata Yadav and R. L. Ujjwal
- Subjects
0209 industrial biotechnology ,business.industry ,Computer science ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,02 engineering and technology ,Industrial and Manufacturing Engineering ,Network congestion ,020901 industrial engineering & automation ,Resource (project management) ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,Bandwidth (computing) ,020201 artificial intelligence & image processing ,business ,Cluster analysis ,Queue ,Wireless sensor network ,Software ,Computer network ,Buffer overflow - Abstract
A network of randomly deployed sensor nodes which shares limited resources like bandwidth, buffer, queue, and battery powered nodes is known as wireless sensor network. Such network must have energy, to avoid the chances of congestion because congested network degrades the performance of network. Congestion may occur due to several reasons like data packet collision, transmission channel contention and buffer overflow. A congestion control protocol must acquire the functionalities that can increase the lifetime and efficiency of network which are major responsibilities of wireless sensor network. In this paper traffic oriented, resource oriented and a hybrid approach with some additional functionalities of controlling congestion are discussed in a wide manner. The hybrid approach is best as per this survey as it integrates various factors of wireless sensor networks to control and mitigate the situation. A comprehensive analysis is also done on these factors to justify the nature of different approaches.
- Published
- 2020
- Full Text
- View/download PDF
172. An instrumentation based algorithm for stack overflow detection
- Author
-
Javier Carrillo-Mondejar, J. M. Castelo-Gómez, José Luis Martínez, and José Roldán-Gómez
- Subjects
Binary analysis ,021110 strategic, defence & security studies ,Computer science ,media_common.quotation_subject ,0211 other engineering and technologies ,Local variable ,Memory corruption ,02 engineering and technology ,Computational Theory and Mathematics ,Stack (abstract data type) ,Hardware and Architecture ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science (miscellaneous) ,Stack overflow ,Instrumentation (computer programming) ,Function (engineering) ,Algorithm ,Software ,Buffer overflow ,media_common - Abstract
Despite all the efforts made by the scientific community in terms of computer security, buffer overflow vulnerabilities continue being the biggest security flaw in applications, since they compromise the security of the system through memory corruption. To tackle this problem, there are different techniques based on the binary analysis of the application in question. With this objective in mind, the present paper proposes an algorithm based on the dynamic instrumentation of binaries, that is, dynamic local variables belonging to the functions of the program are detected, and a check is performed to see whether there is an overflow of memory between them. The results obtained show how the proposed algorithm is able to detect buffer overflow errors in the stack frames of a function.
- Published
- 2020
- Full Text
- View/download PDF
173. Point of Congestion in Large Buffer Mobile Opportunistic Networks
- Author
-
Suvadip Batabyal and Gourish Goudar
- Subjects
Routing protocol ,Computer science ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,02 engineering and technology ,Buffer (optical fiber) ,Computer Science Applications ,Modeling and Simulation ,Congestion detection ,0202 electrical engineering, electronic engineering, information engineering ,Network performance ,Electrical and Electronic Engineering ,business ,Buffer overflow ,Computer network - Abstract
Congestion detection and management are difficult to realize in Mobile Opportunistic Networks (MONs) due to the lack of end-to-end connectivity, global information, absence of ACKs/NACK messages. One of the simplest means of detecting congestion in any network, primarily in the intermediate nodes, is buffer overflow leading to packet drop. Although researchers in this area have used this phenomenon to detect congestion, this is not always true for a MON, especially under large buffers. We show that in MONs with large buffers, there exists a critical buffer occupancy beyond which congestion sets in, and network performance degrades even though the buffer may not be full. To study this behavior, we develop an analytical model based on forwarding probability by considering the nodes to have a large buffer size and finite bandwidth. Using Epidemic forwarding as the underlying routing protocol, the analytical model is used to detect the exact buffer occupancy that leads to congestion. The theoretical results have been compared with the simulation results to prove the correctness of the model.
- Published
- 2020
- Full Text
- View/download PDF
174. Bidirectional Viterbi decoding algorithm for OvTDM
- Author
-
Yue Hu, Haocheng Wang, and Yafeng Wang
- Subjects
Computational complexity theory ,Computer Networks and Communications ,Computer science ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Spectral efficiency ,Trellis (graph) ,Viterbi algorithm ,symbols.namesake ,Viterbi decoder ,Encoding (memory) ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Algorithm ,Decoding methods ,Buffer overflow - Abstract
Overlapped time domain multiplexing (OvTDM) is an innovative encoding scheme that can obtain high spectral efficiency. However, the intentional inter-symbol interference (ISI) caused by OvTDM will make the decoding process more complex. The computational complexity of maximum likelihood sequence detection increases exponentially with the growth of spectral efficiency in OvTDM. As a consequence of high complexity, the decoding effort for a given spectral efficiency may occasionally exceed the physical limitations of the decoder, leading inevitably to buffer overflows and information erasures. In this paper, we propose a bidirectional Viterbi algorithm (BVA) based on the bidirectional sequence decoding for OvTDM. With the BVA, the decoding operation starts simultaneously from the both ends of the corresponding trellis and stops at the middle of trellis. The simulation results show that compared with Viterbi algorithm (VA), the decoding time of BVA can be reduced by about half. And the memory space of two decoders in BVA are about half of that in VA, which means that the BVA has lower memory requirements for decoder. And the decoding performance of BVA is almost the same as VA.
- Published
- 2020
- Full Text
- View/download PDF
175. EVALUATION OF SIMULATION RESULTS OF DATA TRANSMISSION MODELING ON A CHANNEL WITH RANDOM ACCESS
- Author
-
Yurii Dolhyi
- Subjects
Task (computing) ,Network packet ,Control theory ,Computer science ,Numerical analysis ,Probability distribution ,System of linear equations ,Networking hardware ,Data transmission ,Buffer overflow - Abstract
The subject of the article is the evaluation of the results of a mathematical model consisting of systems of equations that describe the various states of the system and the laws of distribution of packet service time, which allows to investigate the main probability-time characteristics and analyze the operation of a single device. The purpose of the article is to evaluate the results of a mathematical model of the operation of a data network with competing access based on a switching device with a finite buffer size. To achieve the maximum probability, it is necessary to use switches with the optimal size of the buffer, so that the delay was small, and the buffer did not overflow too quickly at high load of the switch, which is the task of this article. A mathematical model consisting of systems of equations describing different states of the system and packet service time distribution laws is proposed, which allows to investigate the main probability-time characteristics and analyze the operation of a single system device and its interaction with other network devices based on the density of the probability distribution of packet service time. The final result is the obtained distribution densities of packet delivery time for different operating modes of the system that can be approximated by the corresponding analytical distribution law. The model allows to calculate the probability of data delivery, taking into account the final size of the buffers used by the data. The conclusion can be considered that, for achievement of the maximum probability it is necessary to use switches with the optimum size of the buffer that both delay was small, and the buffer is not overflowed too quickly at high loading of the switch. Thus, with the help of the developed model it is possible to solve the problem of choosing the optimal size of the switch buffer and estimating the data delivery time. Since buffer overflow leads to loss of information frames, which, in turn, leads to increased packet delivery time.
- Published
- 2020
- Full Text
- View/download PDF
176. Finding Bugs in File Systems with an Extensible Fuzzing Framework
- Author
-
Jungyeon Yoon, Sanidhya Kashyap, Wen Xu, Taesoo Kim, Meng Xu, and Seulbae Kim
- Subjects
File system ,Focus (computing) ,Memory errors ,Programming language ,Computer science ,Assertion ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Fuzz testing ,computer.software_genre ,Hardware and Architecture ,POSIX ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,0202 electrical engineering, electronic engineering, information engineering ,Turnkey ,computer ,Buffer overflow - Abstract
File systems are too large to be bug free. Although handwritten test suites have been widely used to stress file systems, they can hardly keep up with the rapid increase in file system size and complexity, leading to new bugs being introduced. These bugs come in various flavors: buffer overflows to complicated semantic bugs. Although bug-specific checkers exist, they generally lack a way to explore file system states thoroughly. More importantly, no turnkey solution exists that unifies the checking effort of various aspects of a file system under one umbrella. In this article, to highlight the potential of applying fuzzing to find any type of file system bugs in a generic way, we propose H ydra , an extensible fuzzing framework. H ydra provides building blocks for file system fuzzing, including input mutators, feedback engines, test executors, and bug post-processors. As a result, developers only need to focus on building the core logic for finding bugs of their interests. We showcase the effectiveness of H ydra with four checkers that hunt crash inconsistency, POSIX violations, logic assertion failures, and memory errors. So far, H ydra has discovered 157 new bugs in Linux file systems, including three in verified file systems (FSCQ and Yxv6).
- Published
- 2020
- Full Text
- View/download PDF
177. Delay-Sensitive Energy-Harvesting Wireless Sensors: Optimal Scheduling, Structural Properties, and Approximation Analysis
- Author
-
Nicholas Mastronarde, Jacob Chakareski, and Nikhilesh Sharma
- Subjects
Mathematical optimization ,Computer science ,Network packet ,Approximation algorithm ,020206 networking & telecommunications ,02 engineering and technology ,Submodular set function ,Scheduling (computing) ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Queuing delay ,020201 artificial intelligence & image processing ,Fading ,Markov decision process ,Electrical and Electronic Engineering ,Wireless sensor network ,Queue ,Buffer overflow ,Efficient energy use - Abstract
We consider an energy harvesting sensor transmitting latency-sensitive data over a fading channel. We aim to find the optimal transmission scheduling policy that minimizes the packet queuing delay given the available harvested energy. We formulate the problem as a Markov decision process (MDP) over a state-space spanned by the transmitter’s buffer, battery, and channel states, and analyze the structural properties of the resulting optimal value function, which quantifies the long-run performance of the optimal scheduling policy. We show that the optimal value function (i) is non-decreasing and has increasing differences in the queue backlog; (ii) is non-increasing and has increasing differences in the battery state; and (iii) is submodular in the buffer and battery states. Taking advantage of these structural properties, we derive an approximate value iteration algorithm that provides a controllable tradeoff between approximation accuracy, computational complexity, and memory, and we prove that it converges to a near-optimal value function and policy. Our numerical results confirm these properties and demonstrate that the resulting scheduling policies outperform a greedy policy in terms of queuing delay, buffer overflows, energy efficiency, and sensor outages.
- Published
- 2020
- Full Text
- View/download PDF
178. IMPULP: A Hardware Approach for In-Process Memory Protection via User-Level Partitioning
- Author
-
Hong Zonghui, Zong-Hao Yang, Yuhang Liu, Guo Yunge, Mingyu Chen, Yangyang Zhao, and Xiaojing Zhu
- Subjects
Hardware_MEMORYSTRUCTURES ,Computer science ,business.industry ,020207 software engineering ,02 engineering and technology ,Computer Science Applications ,Theoretical Computer Science ,Instruction set ,Memory leak ,Computational Theory and Mathematics ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,business ,Software ,Computer hardware ,Memory protection ,Buffer overflow - Abstract
In recent years many security attacks occur when malicious codes abuse in-process memory resources. Due to the increasing complexity, an application program may call third-party code which cannot be controlled by programmers but may contain security vulnerabilities. As a result, the users have the risk of suffering information leakage and control flow hijacking. However, current solutions like Intel memory protection extensions (MPX) severely degrade performance, while other approaches like Intel memory protection keys (MPK) lack flexibility in dividing security domains. In this paper, we propose IMPULP, an effective and efficient hardware approach for in-process memory protection. The rationale of IMPULP is user-level partitioning that user code segments are divided into different security domains according to their instruction addresses, and accessible memory spaces are specified dynamically for each domain via a set of boundary registers. Each instruction related to memory access will be checked according to its security domain and the corresponding boundaries, and illegal in-process memory access of untrusted code segments will be prevented. IMPULP can be leveraged to prevent a wide range of in-process memory abuse attacks, such as buffer overflows and memory leakages. For verification, an FPGA prototype based on RISC-V instruction set architecture has been developed. We present eight tests to verify the effectiveness of IMPULP, including five memory protection function tests, a test to defense typical buffer overflow, a test to defense famous memory leakage attack named Heartbleed, and a test for security benchmark. We execute the SPEC CPU2006 benchmark programs to evaluate the efficiency of IMPULP. The performance overhead of IMPULP is less than 0.2% runtime on average, which is negligible. Moreover, the resource overhead is less than 5.5% for hardware modification of IMPULP.
- Published
- 2020
- Full Text
- View/download PDF
179. An Efficient Buffer Overflow Control Scheme to Mitigate Packet Loss in Manets
- Author
-
B Purushotham, Ch D V Subba Rao, and Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP)
- Subjects
Scheme (programming language) ,Environmental Engineering ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Control (management) ,General Engineering ,B3732129219/2020©BEIESP ,2249-8958 ,Computer Science Applications ,Packet loss ,business ,computer ,Buffer Overflow, Mobile Ad hoc Networks, Packet Loss, Queue Management ,Computer network ,computer.programming_language ,Buffer overflow - Abstract
MANET (Mobile Ad hoc Network) is self-configuring, self-organizing, infrastructure-less network of mobile devices connected without wires. Because of the dynamic changes in the network topology, there is no centralized control in ad hoc networks. So, mobile nodes can communicate with each other via intermediate nodes. The buffer size of intermediate nodes plays a significant role to hold packets in the buffer before dropping the newly arrived packets. In MANET, buffer overflow (congestion) occurs in any intermediary nodes when data packets pass through source to destination and incurs packet loss, which causes the performance degradations of a network. Congestion can be reduced by using several Active Queue Management [AQM] techniques. Queue Management Node or “QMN” is an active queue management strategy to control packet drops by assigning space of a buffer node to all its neighbouring nodes dynamically depending upon the total number of packets received from its neighbours. In this scheme, authors did not take into account the impact of collaboration between neighbors of a central node. They only consider the characteristics of nodes, while ignoring the message properties in MANET. And also a new node has to be waiting until it will get enough equal space from the QMN along with other neighbor nodes. During this waiting period, high packet loss can be occurred. So, an efficient buffer overflow control scheme is required to make sure every node has adequate storage space to hold the data once the buffer of the node is near to congestion. In this paper, we proposed a scheme that integrates QMN technique with combinational buffer management (CBM) strategy, which includes both the features of messages and nodes, and transfer the duplicated messages to neighbour node for total utility optimization, rather than deleting them. By using this scheme packet loss can be mitigated in MANETs efficiently. Our simulation results here reveal that, the proposed scheme achieves better performance than other existing schemes in terms of packet delivery ratio, throughput, overhead ratio and end to end delay
- Published
- 2020
- Full Text
- View/download PDF
180. FJND-based fuzzy rate control of scalable video for streaming applications
- Author
-
Mehdi Rezaei and Maryam Shojaei
- Subjects
Computer Networks and Communications ,Computer science ,Quantization (signal processing) ,Real-time computing ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Macroblock ,020207 software engineering ,02 engineering and technology ,Variable bitrate ,Fuzzy logic ,Hardware and Architecture ,Control theory ,Distortion ,Bit rate ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Bitstream ,Quantization (image processing) ,Software ,Group of pictures ,Buffer overflow - Abstract
A fuzzy rate controller with buffer constraint in combination with a perceptual quality controller is proposed for streaming applications of the AVC/H.264 scalable (SVC) video. The bit rate of each video layer is controlled separately by the fuzzy controller that adjusts the quantization parameter (QP) on a group of pictures (GOP) basis. The QPs of pictures are computed from the GOP QP by the well-known QP cascading technique. While the fuzzy controller provides the buffering constraint for each video layer, the quality controller tries to improve the perceptual quality of the compressed video based on the foveated just-noticeable distortion (FJND) model. The quality controller regulates the QP of each macroblock around the picture QP based on the visibility threshold of the FJND model. In these applications, the initial buffering allows slight variations of the bit rate leading to produce a variable bit rate (VBR) video bit stream with consistent quality. Experimental results show that the proposed algorithm effectively adapts to the buffer size, while strictly prevents buffer overflow and underflow. In addition, incorporating the perceptual quality controller into the fuzzy rate controller achieves higher perceptual quality at the same bit rate.
- Published
- 2020
- Full Text
- View/download PDF
181. Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques
- Author
-
T. R. Khabibullin, A. G. Beltov, I. Y. Zhukov, A. V. Zuykov, and A. S. Smirnov
- Subjects
security of mobile technology ,mobile viruses ,buffer overflow ,secure programming techniques ,Information technology ,T58.5-58.64 ,Information theory ,Q350-390 - Abstract
The article reviews the most common mistakes made by developers when writing software for mobile platforms which lead to appearing vulnerabilities that allow attackers to perform various types of attacks. The basic principles of defensive programming are presented.
- Published
- 2012
182. Improved videotransmission over lossy channels using parallelization
- Author
-
Günzel, Christoph, Riemenschneider, Falko, Wirtgen, Jürgen, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, and Rolim, José, editor
- Published
- 1998
- Full Text
- View/download PDF
183. The remote enqueue operation on networks of workstations
- Author
-
Markatos, Evangelos P., Katevenis, Manolis G. H., Vatsolaki, Penny, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Panda, Dhabaleswar K., editor, and Stunkel, Craig B., editor
- Published
- 1998
- Full Text
- View/download PDF
184. A tool for pro-active defense against the buffer overrun attack
- Author
-
Bruschi, D., Rosti, E., Banfi, R., Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Quisquater, Jean-Jacques, editor, Deswarte, Yves, editor, Meadows, Catherine, editor, and Gollmann, Dieter, editor
- Published
- 1998
- Full Text
- View/download PDF
185. Rate Control in MPEG
- Author
-
Mitchell, Joan L., Pennebaker, William B., Fogg, Chad E., LeGall, Didier J., Mitchell, Joan L., Pennebaker, William B., Fogg, Chad E., and LeGall, Didier J.
- Published
- 1996
- Full Text
- View/download PDF
186. Refinements to Rate-Based Flow Control with Extensions to Multidrop Applications
- Author
-
Pejhan, S., Schwartz, M., Anastassiou, D., Mason, Lorne, editor, and Casaca, Augusto, editor
- Published
- 1996
- Full Text
- View/download PDF
187. A Traffic Descriptor-Based Flow Control Scheme for Efficient Video Transmission over ATM
- Author
-
Jung, Souhwan, Meditch, James S., Wang, Yao, editor, Panwar, Shivendra, editor, Kim, Seung-Pil, editor, and Bertoni, Henry L., editor
- Published
- 1996
- Full Text
- View/download PDF
188. Hard Real-Time Reliable Multicast in the Dedos System
- Author
-
Alstein, Dick, van der Stok, Peter, Stankovic, John A., editor, Fussell, Donald S., editor, and Malek, Miroslaw, editor
- Published
- 1995
- Full Text
- View/download PDF
189. ROP gadget analyzer for the RISC-V architecture
- Author
-
Comes Sanchis, Josep
- Subjects
Buffer overflow ,Exploit ,ARQUITECTURA Y TECNOLOGIA DE COMPUTADORES ,ELF ,Grado en Ingeniería Informática-Grau en Enginyeria Informàtica ,Return Oriented Programming ,RISC-V ,ROP - Abstract
[ES] A raíz del desarrollo de la técnica de protección NX (Non eXecutable), el uso de shellcodes para la ejecución de código arbitrario se vio seriamente afectado. Fruto de esta limitación, los atacantes desarrollaron nuevas técnicas para poder explotar las vulnerabilidades presentes en los sistemas informáticos. La técnica más importante es ROP (Return Oriented Programming), que permite reordenar el código ejecutable presente en un proceso para conseguir ejecutar lo que un atacante desee. El presente trabajo aborda la implementación de una herramienta en el lenguaje C, que a partir de un fichero ejecutable ELF de la arquitectura de computadores RISC-V, halle todos los gadgets que podrían ser utilizados para la construcción de payloads., [EN] Following the development of the NX (Non eXecutable) protection technique, the use of shellcodes for arbitrary code execution was seen seriously affected. As a result of this limitation, the attackers developed new techniques to exploit the vulnerabilities present. in computer systems. The most important technique is ROP (Return Oriented Programming), which allows reordering the present executable code in a process to get whatever an attacker wants to execute. This paper deals with the implementation of a tool in the C language, which from an ELF executable file of the RISC-V computers, find all the gadgets that could be used for the construction of payloads., [CA] Arran del desenvolupament de la t`ecnica de protecci´o NX (Non eXecutable), l’´us de shellcodes per a l’execuci´o de codi arbitrari es va veure seriosament afectat. Fruit d’aquesta limitaci´o, els atacants van desenvolupar noves t`ecniques per poder explotar les vulnerabilitats presents en els sistemes inform`atics. La t`ecnica m´es important ´es ROP (Return Oriented Programming), que permet reordenar el codi executable present en un proc´es per aconseguir executar el que un atacant desitja. El present treball aborda la implementaci´o d’ una eina en el llenguatge C, que a partir d’ un fitxer executable ELF de l’ arquitectura de computadors RISC-V, trobi tots els gadgets que podrien ser utilitzats per a la construcci´o de payloads.
- Published
- 2022
190. Closed Queueing Network Modeling for End-to-End Performance Analysis of ISO LLC and Transport Protocols over Bridged Networks
- Author
-
Ikegawa, Takashi, Onvural, Raif O., editor, and Nilsson, Arne, editor
- Published
- 1993
- Full Text
- View/download PDF
191. A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems.
- Author
-
Das, Sanjeev, Zhang, Wei, and Liu, Yang
- Subjects
EMBEDDED computer systems ,COMPUTER software execution ,FIELD programmable gate arrays ,ENERGY consumption ,ARCHITECTURAL design ,COMPUTER security vulnerabilities - Abstract
Runtime attacks on memory, such as buffer overflow based stack smashing and code reuse attacks, are common in embedded systems. Control flow integrity (CFI) has been acknowledged as one promising approach to protect against such runtime attacks. However, previous CFI implementations suffer from coarse granularity (which can be circumvented by an advanced attack model) and high-performance overhead. In this paper, first, we present an approach to enforce fine-grained CFI at a basic block level, named basic block CFI (BB-CFI), which aims to defend against aforesaid attacks. The key idea is to verify the target address (TA) of control flow instructions (CFINs) (e.g., \mathttcall , \mathttret , and \mathttjmp ), which may be modified by the adversary. BB-CFI contains two stages: 1) offline profiling of the program—to extract the control flow information and 2) runtime control flow checking—to verify the TA of CFINs using the extracted information. We also handle the exceptional cases (e.g., multithreading, C++ exception, and longjump) that are found in complex binaries. Second, we propose an architectural design of control flow checker (CFC), which monitors the program execution during runtime to enforce BB-CFI. For proof of concept, we implement the CFC in field-programmable gate array (FPGA). Our method does not require the modification of the source code or the instruction set architecture. The experimental results demonstrate that BB-CFI is effective against runtime attacks, with 100% verification accuracy. The CFC implementation on FPGA shows <1% performance overhead and a small dynamic power consumption of 78 mW, with very small area footprint. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
192. ROPocop — Dynamic mitigation of code-reuse attacks.
- Author
-
Follner, Andreas and Bodden, Eric
- Subjects
- *
COMPUTER crimes , *COMPUTER programming , *COMPUTER debugging software , *DYNAMIC programming , *COMPUTER security - Abstract
Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years. Researchers have answered the threat with various mitigation techniques; but nevertheless, new exploits that successfully bypass these technologies still appear on a regular basis. In this paper, we propose ROPocop, a novel approach for detecting and preventing the execution of injected code and for mitigating code-reuse attacks such as return-oriented programming (RoP). ROPocop uses dynamic binary instrumentation, requiring neither access to source code nor debug symbols or changes to the operating system. It mitigates attacks both by monitoring the program counter at potentially dangerous points and by detecting suspicious program flows. We have implemented ROPocop for Windows x86 using PIN, a dynamic program instrumentation framework from Intel. Benchmarks using the SPEC CPU2006 suite show an average overhead of 2.4×, which is comparable to similar approaches, which give weaker guarantees. Real-world applications show only an initially noticeable input lag and no stutter. In our evaluation our tool successfully detected all 11 of the latest real-world code-reuse exploits, with no false alarms. Therefore, despite the overhead, it is a viable, temporary solution to secure critical systems against exploits if a vendor patch is not yet available. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
193. On the Throughput of Multi-Source Multi-Destination Relay Networks With Queueing Constraints.
- Author
-
Li, Yi, Gursoy, M. Cenk, and Velipasalar, Senem
- Abstract
In this paper, the throughput of relay networks with multiple source–destination pairs under queueing constraints has been investigated for both variable-rate and fixed-rate schemes. When channel side information (CSI) is available at the transmitter side, transmitters can adapt their transmission rates according to the channel conditions, and achieve the instantaneous channel capacities. In this case, the departure rates at each node have been characterized for different system parameters, which control the power allocation, time allocation, and decoding order. In the other case of no CSI at the transmitters, a simple automatic repeat request (ARQ) protocol with fixed rate transmission is used to provide reliable communication. Under this ARQ assumption, the instantaneous departure rates at each node can be modeled as an ON–OFF process, and the probabilities of ON and OFF states are identified. With the characterization of the arrival and departure rates at each buffer, stability conditions are identified, and an effective capacity analysis is conducted for both cases to determine the system throughput under statistical queueing constraints. In addition, for the variable-rate scheme, the concavity of the sum rate is shown for certain parameters, helping to improve the efficiency of parameter optimization. Finally, through numerical results, the influence of system parameters and the behavior of the system throughput are identified. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
194. Survey of return-oriented programming defense mechanisms.
- Author
-
Ruan, Yefeng, Kalyanasundaram, Sivapriya, and Zou, Xukai
- Subjects
DATA security ,CYBERTERRORISM ,COMPUTER operating systems ,COMPUTER software ,COMPUTER storage devices - Abstract
A prominent software security violation-buffer overflow attack has taken various forms and poses serious threats until today. One such vulnerability is return-oriented programming attack. An return-oriented programming attack circumvents the dynamic execution prevention, which is employed in modern operating systems to prevent execution of data segments, and attempts to execute unintended instructions by overwriting the stack exploiting the buffer overflow vulnerability. Numerous defense mechanisms have been proposed in the past few years to mitigate/prevent the attack - compile time methods that add checking logic to the program code before compilation, dynamic methods that monitor the control-flow integrity during execution and randomization methods that aim at randomizing instruction locations. This paper discusses (i) these different static, dynamic, and randomization techniques proposed recently and (ii) compares the techniques based on their effectiveness and performances. Copyright © 2015 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
195. Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems.
- Author
-
Leon, Erick and Bruda, Stefan D.
- Subjects
ELECTRONIC countermeasures ,BUFFER storage (Computer science) ,R (Computer program language) ,LINUX operating systems ,CYBERTERRORISM - Abstract
We address the particular cyber attack technique known as stack buffer overflow in GNU/Linux operating systems, which are widely used in HPC environments. The buffer overflow problem has been around for quite some time and continues to be an ever present issue. We develop a mechanism to successfully detect and react whenever a stack buffer overflow occurs. Our solution requires no compile-time support and so can be applied to any program, including legacy or closed source software for which the source code is not available. This makes it especially useful in HPC environments where given their complexity and scope of the computing system, incidents like overflows might be difficult to detect and react to accordingly. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
196. Traffic-aware Cooperative Binary Exponential Backoff Algorithm for Low Power and Lossy Networks.
- Author
-
Hussen, Hassen, Teja, Chekka, Miao, Ting, Kim, Kangseok, and Kim, Ki-Hyung
- Subjects
CARRIER sense multiple access ,MULTIPLE access protocols (Computer network protocols) ,COMPUTER network protocols ,NETWORK routing protocols ,ALGORITHMS - Abstract
In Low Power and Lossy Networks (LLNs), not only the transmission qualities between a sender and a receiver, but also the channel contention and resource limitations at the receiver side should be considered. Providing efficient backoff mechanism against channel access collision problem in low-power, low-cost and low data rate networks has received a lot of attention from many researchers in the field. In such networks, the IEEE 802.15.4 Medium Access Control protocol CSMA/CA uses Binary Exponential Backoff (BEB) algorithm to address the channel collision problem. Though BEB reduces collision on the multiple channel access, there is still a high packet drop probability due to the buffer limitation on the receiving node. To overcome this problem, this paper focuses on the BEB issues for LLNs and targets on RPL, which is one of the most popular cooperative routing protocols in LLNs. In RPL, it is not uncommon to have a node with relatively higher traffic than neighbor nodes because children nodes have a tendency to select a good routing metric node as a parent. If traffic concentrates on a good quality parent, it becomes inevitable to get packet loss due to the buffer overflow and channel collision. In this paper we have proposed a Traffic-aware cooperative Binary Exponential Backoff (TBEB) algorithm for LLNs with RPL routing protocol. TBEB handles the multiple channel access issue in such a way that it avoids not only the collision at the sender (child node) side but also the buffer overflow at the receiver (parent node) side without degrading the channel utilization and the throughput efficiency. MATLAB simulator is used to evaluate the performance of the proposed scheme and then compare the result with BEB and Improved BEB. Simulation results show that the TBEB algorithm improves the throughput while minimizing packet discard counts and the channel collision through maintaining good channel utilization. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
197. Equilibrium Point Analysis of a Slotted Ring
- Author
-
Woodward, Michael E., van Rijsbergen, C. J., editor, Hillston, Jane Elizabeth, editor, King, Peter John Beaufoy, editor, and Pooley, Robert John, editor
- Published
- 1992
- Full Text
- View/download PDF
198. A continuous media data transport service and protocol for real-time communication in high speed networks
- Author
-
Wolfinger, Bernd, Moron, Mark, Goos, G., editor, Hartmanis, J., editor, and Herrtwich, R. G., editor
- Published
- 1992
- Full Text
- View/download PDF
199. A Fuzzing Method for Embedded Software
- Author
-
Kai Deng, Yubing Duan, and Xiaolei Deng
- Subjects
Computer science ,business.industry ,Crash ,Fuzz testing ,Application software ,computer.software_genre ,Fuzzy logic ,Automation ,Embedded software ,Software engineering ,business ,computer ,Independent research ,Buffer overflow - Abstract
Fuzz testing is an important means of vulnerability discovery, but now fuzz testing technology is most for application software on traditional computer platforms, which can be not used on embedded software. We propose a fuzzing method for embedded software, which can solve the two technical difficulties: abnormal monitoring and automation. Also, we independent research and develop embedded fuzzy testing tool called Efuzzer. Experiments prove that the tool has very good practicality and is effective for discover buffer overflow vulnerabilities which can cause a system crash. Now the tool is tried in several software testing institutions, a few vulnerabilities were discovered.
- Published
- 2021
- Full Text
- View/download PDF
200. Non-invasive I2C Hardware Trojan Attack Vector
- Author
-
Jordane Lorandel, Mohamed Amine Khelif, and Olivier Romain
- Subjects
Password ,Computer science ,business.industry ,Context (language use) ,Encryption ,Computer security ,computer.software_genre ,law.invention ,Information sensitivity ,Hardware Trojan ,law ,EPROM ,business ,computer ,Buffer overflow ,EEPROM - Abstract
In smartphones, and more generally in IoT devices, manufacturers focus their efforts on securing communications with the outside world that are more exposed to attack while considering communications between secure components. By doing this, it results in internal communication buses with little or no security against attackers. I2C is the most used internal communication bus in IoT devices to communicate with sensors and memories. It is also used in recent smartphones to connect the Trusted Execution Environments (ARM TrustZone, Apple SEP, or Google Titan M) to a dedicated EEPROM memory that contains secret information such as encryption keys, anti-replay counter, or the boot ROM. In this paper, we propose a non-invasive attack through a hardware trojan on the I2C bus, which will allow us to perform two attack scenarios: a heart bleeding type attack which will allow retrieving additional information at each memory read, and a buffer overflow attack which will allow writing additional data in the memory at each write which can result in modifying secret information such as password or counters. These attacks can be performed on any device using the I2C bus. In the context of smartphones, these attacks will allow the extraction of sensitive information stored in the secure EEPROM memory.
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.