Abhishek Singh

Abhishek Singh
  • Master of Science
  • Engineering Leader at Cisco Systems, Inc

About

15
Publications
2,409
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
58
Citations
Introduction
Email Research.
Current institution
Cisco Systems, Inc
Current position
  • Engineering Leader

Publications

Publications (15)
Patent
Techniques for detecting malicious attacks may monitor activities during execution of content (e.g., network downloads and email) to identify an instruction backdoor on a computer. An instruction backdoor is malware that opens a port for listening for instructions from a remote server. Such instructions may trigger activation of malicious activity....
Article
This chapter discusses the anti-reversing techniques, which include concept of disassembly, anti debugging, and virtual machine detection. This is followed by a discussion on the packers and their protection mechanism. Packers, which disassemble the binaries, also prevent reverse engineering of software. The chapter concludes with the unpacking me...
Article
Programs are tightly coupled with the operating system. So for reversing of binaries it becomes important to understand the principles and features of operating system. Some of the features which are discussed in this chapter are, virtual memory, portability, multithread, multiprocessor capability, security and compatibility. Windows NT is a 32-bit...
Article
This chapter discusses various vulnerabilities in an application. By using case studies of real exploits it discusses the exploitation of vulnerabilities. The chapter also discusses the identification of these vulnerabilities by analyzing assembly code.
Chapter
PE stands for 'portable executable' file format. As the name suggests, the format can be portable across all the 32-bit operating system and can be executed on any version of windows. The format is also being used by 32-bit dlls and Windows NT device derivers. The WINNT.H header file defines the structure definition representation for the PE file f...
Chapter
Assembly language implements a symbolic representation of the numeric machine codes and other constants needed to program a particular CPU architecture.Operations of software are visible in the assembly language. Understanding of assembly language is required to get a better understanding of the low level software binaries. This chapter focuses on...
Conference Paper
Full-text available
Code migration in light of distributed data intensive computing poses interesting compilation issues. In this work, we first define a small extension to the aglet model to allow data distribution. In our aglet program, data is distributed over the network using annotations (this is similar to High Performance Fortran (HPF) where the programmer spec...
Article
Full-text available
Real time communication can drastically improve the fault/failure of distributed transformers and feeders . The root cause behind failures is lack of current operating information and hence leads to lack of precautions and preventive measures. The proposed scheme demands real time communication between centralized control station and distributed lo...
Article
Full-text available
This report proposes compiler based approach for execution of bigger applications on small hand held devices. It makes use of control flow graph and data dependency graph to represent essential ordering constraints among the statements or operations in a program.By using these techniques reordering of statements are done so as to match code to the...
Article
Full-text available
In this paper we present a design and implementation of a scalable, distributed web-crawler. The motivation for design of such a system to effectively distribute crawling tasks to different machined in a peer-peer distributed network. Such architecture will lead to scalability and help tame the exponential growth or crawl space in the World Wide We...
Article
Full-text available
Prevention of malicious communication channel has been an important issue in building secure networked systems. Malicious Communication channel can be established by using header fields which follow particular semantics or by using data fields, which do not follow any particular semantics. There have been many research directions to prevent the mal...
Article
Full-text available
A mobile agent carries instructions and performs computation at databases. This paper proposes the use of a DRT along with the route generated by the agent scheduler so that an agent can decide what it sould do when it encounters an inaccessible database. The DRT is generated using the data flow graph of the instructions carried by the agent. We pr...

Network

Cited By