About
15
Publications
2,409
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
58
Citations
Introduction
Email Research.
Current institution
Publications
Publications (15)
Techniques for detecting malicious attacks may monitor activities during execution of content (e.g., network downloads and email) to identify an instruction backdoor on a computer. An instruction backdoor is malware that opens a port for listening for instructions from a remote server. Such instructions may trigger activation of malicious activity....
This chapter discusses the anti-reversing techniques, which include concept of disassembly, anti debugging, and virtual machine
detection. This is followed by a discussion on the packers and their protection mechanism. Packers, which disassemble the
binaries, also prevent reverse engineering of software. The chapter concludes with the unpacking me...
Programs are tightly coupled with the operating system. So for reversing of binaries it becomes important to understand the
principles and features of operating system. Some of the features which are discussed in this chapter are, virtual memory,
portability, multithread, multiprocessor capability, security and compatibility. Windows NT is a 32-bit...
This chapter discusses various vulnerabilities in an application. By using case studies of real exploits it discusses the
exploitation of vulnerabilities. The chapter also discusses the identification of these vulnerabilities by analyzing assembly
code.
PE stands for 'portable executable' file format. As the name suggests, the format can be portable across all the 32-bit operating system and can be executed on any version of windows. The format is also being used by 32-bit dlls and Windows NT device derivers. The WINNT.H header file defines the structure definition representation for the PE file f...
Assembly language implements a symbolic representation of the numeric machine codes and other constants needed to program a particular CPU architecture.Operations of software are visible in the assembly language. Understanding of assembly language is required to get a better understanding of the low level software binaries. This chapter focuses on...
Code migration in light of distributed data intensive computing poses interesting compilation issues. In this work, we first define a small extension to the aglet model to allow data distribution. In our aglet program, data is distributed over the network using annotations (this is similar to High Performance Fortran (HPF) where the programmer spec...
Real time communication can drastically improve the fault/failure of distributed transformers and feeders . The root cause behind failures is lack of current operating information and hence leads to lack of precautions and preventive measures. The proposed scheme demands real time communication between centralized control station and distributed lo...
This report proposes compiler based approach for execution of bigger applications on small hand held devices. It makes use of control flow graph and data dependency graph to represent essential ordering constraints among the statements or operations in a program.By using these techniques reordering of statements are done so as to match code to the...
In this paper we present a design and implementation of a scalable, distributed web-crawler. The motivation for design of such a system to effectively distribute crawling tasks to different machined in a peer-peer distributed network. Such architecture will lead to scalability and help tame the exponential growth or crawl space in the World Wide We...
Prevention of malicious communication channel has been an important issue in building secure networked systems. Malicious Communication channel can be established by using header fields which follow particular semantics or by using data fields, which do not follow any particular semantics. There have been many research directions to prevent the mal...
A mobile agent carries instructions and performs computation at databases. This paper proposes the use of a DRT along with the route generated by the agent scheduler so that an agent can decide what it sould do when it encounters an inaccessible database. The DRT is generated using the data flow graph of the instructions carried by the agent. We pr...