A Survey on Windows Component Loading Vulnerabilities

Abstract

Dynamic loading is a mechanism by which a computer program can, at run time, load a library memory, retrieve the addresses of functions and variables contained in library, execute those functions, and unload the library from memory. Unlike static linking and load time linking, this mechanism allows a computer program to startup in the absence of those libraries, to discover available libraries, and potentially gain additional functionality. Operating systems generally provide two resolution methods, by specifying the full path or the filename of the target component. This common component resolution strategy has an inherent security problem. As only a file name is given, unintended or malicious files with the same file name can be resolved instead. Therefore this paper presents the various vulnerabilities and work related to dynamic component loading vulnerabilities

Authors and Affiliations

U. Haritha , V. Lokanadham Naidu

Keywords

Related Articles

Design and Implementation of Floating Point Multiplier for Better Timing Performance  

IEEE Standard 754 floating point is the most common representation today for real numbers on computers. This paper gives a brief overview of IEEE floating point and its representation. This paper describes a sing...

Survey Paper of Image Matching and Retrieval using Discrete Sine Transformation 

Management of the visual information is challenging as the quantity of data available is very huge. Current utilization of available databases is limited due to the issues in retrieval of the necessary images fro...

A Secured Data Transmission using Genetic based Encryption Techniques over Wireless Networks 

The speedy development in wireless networks entails the defending data while transmitting in the network. To employ cryptographic algorithm is difficult view in wireless networks. Biometric features such as face, v...

Robustness of RC4 against Differential attack  

Cryptanalysis of ciphers is a technique used to find flaws in the cryptographic algorithm and try to overcome these flaws to give much better security. There are many cryptographic algorithms such as DES, AES, RS...

A New Approach for Sharpness and Contrast Enhancement of an Image 

unsharp masking is good tool for sharpness enhancement, it is an anti blurring filter. By using unsharp masking algorithm for sharpness enhancement, the resultant image suffering with two problems, first one is a h...

Download PDF file
  • EP ID EP162007
  • DOI -
  • Views 124
  • Downloads 0

How To Cite

U. Haritha, V. Lokanadham Naidu (2013). A Survey on Windows Component Loading Vulnerabilities. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(5), 1780-1783. https://europub.co.uk./articles/-A-162007