Data protection in memory using byte reordering

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the explosive uses of Internet, personal information can be exposed to attackers through various attacks. API hooking based mechanisms or virtual machine based mechanisms are proposed to protect personal data stored in the memory. But these mechanisms require another application program and attackers can get around by developing their own device drivers. We propose a new memory reorganizing mechanism to protect memory. In our proposed mechanism, a user can define his or her own data types and can store data using his or her own data types so that data formats stored in actual memory have different forms. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Jang, H. J., Hwang, D. W., & Im, E. G. (2008). Data protection in memory using byte reordering. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5075 LNCS, pp. 62–68). https://doi.org/10.1007/978-3-540-69304-8_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free