Application Level Untraceable Vulnerabilities and Countermeasures

被引:0
|
作者
Damodaram, A. [1 ]
Sridevi, R. [1 ]
Rao, K. S. Sadasiva [2 ]
Gandhi, P. Mohan [1 ]
机构
[1] JNTUCEH, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
[2] Sri Indu PG Coll, Dept Comp Sci, Hyderabad, Andhra Pradesh, India
关键词
Application Vulnerabilities; Security Patches; Buffer Overflow;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secured Operating Systems are not at all sufficient to say the Applications are working in a secured environment. Because applications will have many vulnerabilities. Users feel it's a Security failure of Operating Systems, Antivirus tools etc., because those application level vulnerabilities are untraceable. So, this paper emphasizes research on application level untraceable security vulnerabilities in various general purpose applications and their corresponding patches. Buffer Overflow, Web browser Vulnerabilities, Web server vulnerabilities, Oracle apps Vulnerabilities, Vulnerabilities common in all OS and also their corresponding patches are documented in this paper.
引用
收藏
页码:357 / 364
页数:8
相关论文
共 50 条
  • [1] A Survey on Web Application Vulnerabilities and Countermeasures
    Atashzar, Hasty
    Torkaman, Atefeh
    Bahrololum, Marjan
    Tadayon, Mohammad H.
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 647 - 652
  • [2] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [3] Vulnerabilities and countermeasures in electrical substations
    Hussain, Shahbaz
    Hernandez Fernandez, Javier
    Al-Ali, Abdulla Khalid
    Shikfa, Abdullatif
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2021, 33
  • [4] Wireless security: Vulnerabilities and countermeasures
    Johnson, DM
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 91 - 91
  • [5] Security Vulnerabilities and Countermeasures in MPSoCs
    Sant'Ana, Anderson Camargo
    Medina, Henrique
    Moraes, Fernando Gehm
    [J]. IEEE DESIGN & TEST, 2021, 38 (04) : 70 - 77
  • [6] Security Vulnerabilities of SGX and Countermeasures: A Survey
    Fei, Shufan
    Yan, Zheng
    Ding, Wenxiu
    Xie, Haomeng
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [7] An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures
    AbdulGhaffar, AbdulAziz
    Paul, Sumit Kumar
    Matrawy, Ashraf
    [J]. 2023 BIENNIAL SYMPOSIUM ON COMMUNICATIONS, BSC, 2023, : 119 - 124
  • [8] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    [J]. INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [9] Security Vulnerabilities and Countermeasures of Smart Contracts: A Survey
    Sifra, Epherem Merete
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 512 - 515
  • [10] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644