Buffer overflow attack mitigation via Trusted Platform Module (TPM)
As of the date of writing of this paper, we found no effort whatsoever in the employment of Trusted Computing (TC)'s Trusted Platform Module (TPM) security features in Buffer Overflow Attack (BOA) mitigation. Such is despite the extensive application of TPM in providing security based solutions...
Saved in:
Main Authors: | Teh, Jia Yew, Samsudin, Khairulmizam, Udzir, Nur Izura, Hashim, Shaiful Jahari |
---|---|
Format: | Article |
Language: | English |
Published: |
IKRAM Education
2014
|
Online Access: | http://psasir.upm.edu.my/id/eprint/51814/1/Buffer%20overflow%20attack%20mitigation%20via%20Trusted%20Platform%20Module%20%28TPM%29.pdf http://psasir.upm.edu.my/id/eprint/51814/ http://iukl.edu.my/iukl-research-journal/archives/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013) -
Tracking and mitigating classic buffer overflow during software design phase using the attack-based security analysis model
by: Kama, Mohd. Nazri, et al.
Published: (2014) -
Analyzing The Stack-Based Buffer Overflow Problem.
by: Ahmad Nazri, Zainol
Published: (2008) -
Migration virtual trusted platform module state using TPM emulator
by: Abdullah, Kilausuria
Published: (2010) -
Runtime integrity validation of executable C binaries using trusted platform module
by: Teh, Jia Yew
Published: (2017)