Safe Contiki OS: Type and Memory Safety for Contiki OS

Author(s):  
Tomsy Paul ◽  
G. Santhosh Kumar
Keyword(s):  
2018 ◽  
Vol 7 (2.8) ◽  
pp. 261
Author(s):  
Prateek Singhal ◽  
Puneet Sharma ◽  
Deepak Arora

In this paper we propagate the Sybil attack in WSN (Wireless sensor network), by the researchers many attacks have been recognized in WSN till now and there are many attacks which can attack over through internet, Internet of thing means all devices is interconnected to each other M2M over internet and can be attacked by any of the attacker on any devices. Sybil attack is the detrimental attack against sensor network where several counterfeit identities and legitimate identities are used to get prohibited pass in a network. This is major attack which results an information loss and misinterpretation in the network, and it also minimizes the routing disturbance, trustworthiness and dropping sensitivity packets into a network. In this instance node can trust the imaginary node and sharing of information starts, owed to this security of node is get affected and information is lost. In this paper, a survey of CONTIKI OS-2.7, stimulation tool COOJA and the Sybil attack and proposed the defense mechanisms and CAM (Compare and Match) approach to verify the Sybil attack position and prevent it. This Sybil attack can be stimulated on the stimulation tool COOJA which helps to identify the attacker position node, whereas these attacks outcome in uni-casting as well as multicasting and in this paper specifically given the secure security for Wireless sensor network.


Author(s):  
Xiaohua Yin ◽  
Zhiqiu Huang ◽  
Shuanglong Kan ◽  
Guohua Shen ◽  
Zhe Chen ◽  
...  

2021 ◽  
Author(s):  
Hsu-Kang Dow ◽  
Tuo Li ◽  
William Miles ◽  
Sri Parameswaran
Keyword(s):  

2005 ◽  
Vol 4 (1) ◽  
pp. 73-111 ◽  
Author(s):  
Dinakar Dhurjati ◽  
Sumant Kowshik ◽  
Vikram Adve ◽  
Chris Lattner

Author(s):  
Michael Lescisin ◽  
Qusay H. Mahmoud

This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using software security tools for testing code in development as well as monitoring code in deployment to ensure that it is operating securely. The security issues discussed in this article will be split into two categories – memory safety issues and input validation issues. Memory safety issues concern problems of unauthorized memory access such as buffer overflows, stack overflows, use-after-free, double-free, memory leaks, etc. Although not strictly a memory safety issue, concurrency issues, such as data races, will be considered as memory safety issues in this article. Input validation issues concern problems where untrusted input is directly passed to handlers which are designed to handle both data and commands. Examples of this include path traversal, SQL injection, command injection, JavaScript/HTML injection, etc. As a result of this significant difference between these two types of security vulnerabilities, two sets of tools are evaluated with one set focusing on memory safety issues and the other on input validation issues. This article explores the benefits and limitations of current software dynamic analysis tools by evaluating them against both the authors test cases as well as the OWASP Benchmark for Security Automation and proposes solutions for implementing secure software applications.


2019 ◽  
Vol 43 (4) ◽  
pp. 56-56
Author(s):  
Joseph Jones ◽  
James Wasson ◽  
Sean Brown ◽  
Seth Poulsen ◽  
Peter Aldous ◽  
...  

2017 ◽  
Vol 17 (4) ◽  
pp. 915-921 ◽  
Author(s):  
Yousaf Bin Zikria ◽  
Rashid Ali ◽  
Rojeena Bajracharya ◽  
Heejung Yu ◽  
Sung Won Kim
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document