Exploit Development Research on x86 Windows Application: Buffer Overflow
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3
Abstract
The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it
Mitigation of Voltage Sag and Swell by Using Magnitude Tracking Method
Our project proposes a concept to mitigate the voltage sag and swell. There are three types of voltages is being considered. Normal voltage, Lower voltage (sag), Higher voltage (swell) .Normal voltage is being considered...
Low Noise Amplifier (LNA) Design for 57 Ghz to 63 Ghz EHF Narrow Band Systems
Low Noise Amplifier (LNA) of single stage on inductive source degeneration structure for Extremely High Frequency (EHF) is proposed in this paper. The presented LNA for 57GHz-63GHz narrow band system is implemented on 90...
FPGA Based Architecture for Radar Information Analysis
: Radar is an object-detection system that uses radio waves to determine the range, altitude, direction, or speed of objects. The radar transmitter transmits pulses of radio waves or microwaves that bounce off any object...
Privacy Preserved Encrypted Cloud Data Access
Several alternatives exist for storage services with the guarantee of security and availability for data at rest, in motion, and in use. In a cloud context, security can improve due to centralization of data, increased s...
Design of IEEE - 754 Floating point Arithmetic Processor
Design of IEEE - 754 Floating point Arithmetic Processor