Please use this identifier to cite or link to this item: http://dspace.uniten.edu.my/jspui/handle/123456789/11711
DC FieldValueLanguage
dc.contributor.authorMohd Salleh, K.A.en_US
dc.contributor.authorAhmad, A.R.en_US
dc.contributor.authorIsmail, R.en_US
dc.date.accessioned2019-01-23T04:24:06Z-
dc.date.available2019-01-23T04:24:06Z-
dc.date.issued2018-
dc.identifier.urihttp://dspace.uniten.edu.my/jspui/handle/123456789/11711-
dc.description.abstractBuffer overflow marks a phenomenon of a malicious technique employed by attackers, as reported in the NIST statistics. This paper presents a method of implementing a dual stack approach using software to protect the data stack from experiencing the attack by using 3 types of architecture, ranging from parallel program, multi-threading to a simple sequential subroutine. The current research on dual stack may require new hardware or a modified version of compiler which may complicate the implementation. These implementations spark some major issues in code backward compatibility with some changes in the language semantics especially in handling the movement of data to and from the dual stack. This paper discusses the implementation of Alternative Stack prototypes in 3 types of architecture and observation on its behavior during the performance and security test. The test has been benchmarked against the programs that are compiled with Microsoft Security Cookie. The Alternative Stack Architecture 3 prototype displayed a significant performance against the benchmarked programs whilst maintaining the confidentiality, integrity and availability of the programs. © 2018 Authors.
dc.language.isoenen_US
dc.titlePreventing stack overflow using Alternative Stack approachesen_US
dc.typeArticleen_US
item.fulltextNo Fulltext-
item.grantfulltextnone-
Appears in Collections:UNITEN Scholarly Publication
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.