Integrity Verification of Applications on RADIUM Architecture Page: 31
vii, 44 pages : color illustrationsView a full description of this thesis.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
Usage of function calls as measurement points also influenced the performance.
I was able simulate and detect two exploit attacks on Prozilla, Ghttpd, and Nullhttp:
buffer overflow and format string vulnerabilities. So far, the procedure has been effective in
detecting attacks. The exploits used to simulate attacks were obtained from www.exploit-
db.com. Verifying an application from inside the host machine would be more efficient, but
this would defeat the advantage of the trust brought in by asynchronous architectures like
RADIUM. The results are shown in Table 3.1.31
Upcoming Pages
Here’s what’s next.
Search Inside
This thesis can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Thesis.
Tarigopula, Mohan Krishna. Integrity Verification of Applications on RADIUM Architecture, thesis, August 2015; Denton, Texas. (https://digital.library.unt.edu/ark:/67531/metadc804915/m1/39/: accessed July 17, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .