منابع مشابه
Protecting Software Code by Guards
Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protecting program code are too weak (e.g., they have single points of failure) or too expensive to apply (e.g., they incur heavy runtime performance penalty to the protected programs). In this paper, we present and explore a methodology...
متن کاملExploiting and Protecting Dynamic Code Generation
Many mechanisms have been proposed and deployed to prevent exploits against software vulnerabilities. Among them, W⊕X is one of the most effective and efficient. W⊕X prevents memory pages from being simultaneously writable and executable, rendering the decades old shellcode injection technique infeasible. In this paper, we demonstrate that the traditional shellcode injection attack can be reviv...
متن کاملProtecting AJAX Code Using Secure Communication
AJAX is a ubiquitous technology that empowers Web applications by facilitating communication with the server side of the Web transaction. The drawback of this enabling technology is that malicious exploits can use this AJAX “back door” to communicate on behalf the client/server and steal users’ information. In this paper, we present a technique that will protect the AJAX-enabled communication. ...
متن کاملProtecting network users in mobile code systems
Conventional access control mechanisms are rather insensitive to occurrences of context-dependent illegal accesses. Insensitivity to context-dependent accesses may lead to failure to protect network users and resources. Context-dependent illegal accesses resulting from data and privilege flows in open networks cannot be prevented by either authentication or access control mechanisms since unaut...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature Reviews Cancer
سال: 2002
ISSN: 1474-175X,1474-1768
DOI: 10.1038/nrc707