Buffer overflow attack mitigation via Trusted Platform Module (TPM)
As of the date of writing of this paper, we found no effort whatsoever in the employment of Trusted Computing (TC)'s Trusted Platform Module (TPM) security features in Buffer Overflow Attack (BOA) mitigation. Such is despite the extensive application of TPM in providing security based solutions...
| Main Authors: | Teh, Jia Yew, Samsudin, Khairulmizam, Udzir, Nur Izura, Hashim, Shaiful Jahari |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IKRAM Education
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/51814/ http://psasir.upm.edu.my/id/eprint/51814/1/Buffer%20overflow%20attack%20mitigation%20via%20Trusted%20Platform%20Module%20%28TPM%29.pdf |
Similar Items
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013)
by: Yew, Teh Jia, et al.
Published: (2013)
Runtime integrity validation of executable C binaries using trusted platform module
by: Teh, Jia Yew
Published: (2017)
by: Teh, Jia Yew
Published: (2017)
Application of soft computing techniques to adaptive user buffer overflow control on the Internet
by: Lin, W., et al.
Published: (2006)
by: Lin, W., et al.
Published: (2006)
Mutual attestation and integrity verification of RFID system using trusted platform module (TPM) / Mohd Faizal Mubarak
by: Mubarak, Mohd Faizal
Published: (2010)
by: Mubarak, Mohd Faizal
Published: (2010)
FLC: A novel dynamic buffer tuner for shortening service roundtrip time over the Internet by eliminating user-level buffer overflow on the fly
by: Lin, W., et al.
Published: (2005)
by: Lin, W., et al.
Published: (2005)
A novel Fuzzy Logic Controller (FLC) for shortening the TCP channel roundtrip time by eliminating user buffer overflow adaptively
by: Lin, W., et al.
Published: (2005)
by: Lin, W., et al.
Published: (2005)
Numerical study of irregular wave overtopping and overflow
by: Soliman, Akram S M
Published: (2003)
by: Soliman, Akram S M
Published: (2003)
Scale effect of storm sewage overflow structure
by: S. Y. Lim ,, et al.
Published: (1990)
by: S. Y. Lim ,, et al.
Published: (1990)
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
by: Kareem Thajeel, Isam, et al.
Published: (2023)
by: Kareem Thajeel, Isam, et al.
Published: (2023)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
Mitigating sulphate attacks in geotechnical engineering
by: Chegenizadeh, Amin, et al.
Published: (2017)
by: Chegenizadeh, Amin, et al.
Published: (2017)
Battening Down / Greedy after this gossip / The town and river overflow
by: Kinsella, John
Published: (2011)
by: Kinsella, John
Published: (2011)
Deconstruction Overflowed: Doing Undoing from Philosophy's Outer Edge
by: Briggs, Robert
Published: (2023)
by: Briggs, Robert
Published: (2023)
Jawatan TPM imbangi parti
by: Utusan Malaysia
Published: (2021)
by: Utusan Malaysia
Published: (2021)
Lattice structural analysis on sniffing to denial of service attacks
by: B., Prabadevi, et al.
Published: (2019)
by: B., Prabadevi, et al.
Published: (2019)
Cortical functioning in children with developmental coordination disorder: a motor overflow study
by: Licari, M., et al.
Published: (2015)
by: Licari, M., et al.
Published: (2015)
Risk based analysis for detention pond overflow at Iskandar Malaysia (Nusajaya), Johor
by: Suif, Zuliziana
Published: (2008)
by: Suif, Zuliziana
Published: (2008)
The effectiveness of gabion type retaining wall made of tire buffer to mitigate slope failure
by: Ahmad Izzat Asyraf, Yusof
Published: (2019)
by: Ahmad Izzat Asyraf, Yusof
Published: (2019)
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Graduan perluk anjakan paradigma - TPM
Published: (2008)
Published: (2008)
Mini MAHA fokus sektor : TPM
Published: (2011)
Published: (2011)
TPM bentang hasil forensik banjir
by: Ishak, Zulhisham
Published: (2015)
by: Ishak, Zulhisham
Published: (2015)
'Muhyiddin calon sesuai sebagai TPM'
by: Sinar Harian, .
Published: (2020)
by: Sinar Harian, .
Published: (2020)
Dynamic control of urban sewer systems to reduce combined sewer overflows and their adverse impacts
by: Rathnayake, U., et al.
Published: (2019)
by: Rathnayake, U., et al.
Published: (2019)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
UniqueService platform – Trusted service platform for house chores
by: Allahyar, Marina, et al.
Published: (2018)
by: Allahyar, Marina, et al.
Published: (2018)
Productivity Breakthrough With TPM : A Case Study
by: Khai Huat, Jeffrey Low
Published: (2003)
by: Khai Huat, Jeffrey Low
Published: (2003)
Islam selamat, TPM Cina bukan isu
by: Bari, Abdul Aziz
Published: (2010)
by: Bari, Abdul Aziz
Published: (2010)
Syor wujud jawatan TPM redakan polemik
by: Berita Harian
Published: (2020)
by: Berita Harian
Published: (2020)
Implementing severity factor to mitigate malicious insider
by: Asmawi, Aziah, et al.
Published: (2019)
by: Asmawi, Aziah, et al.
Published: (2019)
Detection of vulnerability attack through wireless network on android platform
by: Muhamad Izhan Fakri, Imran
Published: (2014)
by: Muhamad Izhan Fakri, Imran
Published: (2014)
Mitigating cross-site scripting attacks with a content security Policy
by: Yusof, Imran, et al.
Published: (2016)
by: Yusof, Imran, et al.
Published: (2016)
Detection and mitigation of ARP storm attacks using software defined networks
by: Numan, Munther, et al.
Published: (2017)
by: Numan, Munther, et al.
Published: (2017)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Extending TLS with mutual attestation for platform integrity assurance
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
TPM lancar buku Hang Tuah: Catatan Okinawa
by: Universiti Putra Malaysia, Pejabat Strategi Korporat dan Komunikasi
Published: (2015)
by: Universiti Putra Malaysia, Pejabat Strategi Korporat dan Komunikasi
Published: (2015)
Sedia garis panduan elak kejadian berulang: TPM
by: Berita Harian, .
Published: (2019)
by: Berita Harian, .
Published: (2019)
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
by: Abd Aziz, Norazah, et al.
Published: (2014)
by: Abd Aziz, Norazah, et al.
Published: (2014)
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
by: Mubarak, Sinil, et al.
Published: (2019)
by: Mubarak, Sinil, et al.
Published: (2019)
Similar Items
-
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013) -
Runtime integrity validation of executable C binaries using trusted platform module
by: Teh, Jia Yew
Published: (2017) -
Application of soft computing techniques to adaptive user buffer overflow control on the Internet
by: Lin, W., et al.
Published: (2006) -
Mutual attestation and integrity verification of RFID system using trusted platform module (TPM) / Mohd Faizal Mubarak
by: Mubarak, Mohd Faizal
Published: (2010) -
FLC: A novel dynamic buffer tuner for shortening service roundtrip time over the Internet by eliminating user-level buffer overflow on the fly
by: Lin, W., et al.
Published: (2005)