Windows Operating System Vulnerabilities

نویسندگان

  • Gaurav Sharma
  • Ashish Kumar
  • Vandana Sharma
چکیده

Computers have brought about a revolution across all industries. Computers have become the most important part for the success of any enterprise. Computers are the best means for proper storage and management of data. They can assist as knowledge bases and can be utilized for financial transactions due to their processing power and storage capacities. PCs handle and keep a track of data which is very confidential and essential for an organization. So, managing the security of these computers is a very important task. This realization has led to the development of techniques that attempt to detect problems or loopholes in software systems. However, there exist some software failures which could be used for an intentional attempt to severely damage the systems. These software failures commonly denoted as computer vulnerabilities, have special properties that separate them from other software failures. The detailed analysis of each vulnerability classifies its characteristics, policies violated by its exploitation, and leads to the understanding of the measures that are needed to eradicate these vulnerabilities in future programs. This paper aims to demonstrate several vulnerabilities in the http://www.ijccr.com VOLUME 1 ISSUE 3 MANUSCRIPT 13 NOVEMBER 2011 Windows Operating system. It will demonstrate and analyze how registry, clipboard, autoplay and task manger are vulnerable to attacks in Windows XP, Windows Vista and Windows 7.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities

Discovering vulnerabilities in operating system (OS) kernels and patching them is crucial for OS security. However, there is a lack of effective kernel vulnerability detection tools, especially for closed-source OSes such as Microsoft Windows. In this paper, we present Digtool, an effective, binary-code-only, kernel vulnerability detection framework. Built atop a virtualization monitor we desig...

متن کامل

Recovering from Faulty Device Drivers

Several studies (see Swift et. al.’s study of Windows XP in SOSP 2003 and Chou et. al’s study of Linux in SOSP 2001) have attributed a large fraction of operating system failures to device driver flaws. Not only can driver errors cause kernel instability, but these errors can also be exploited for privilege escalation and access to kernel data structures. A search on securityfocus.com shows vul...

متن کامل

An Approach for Analyzing the Robustness of Windows NT Software

Today, the vast majority of software executing on defense systems is untrusted commercial o -the-shelf software such as Microsoft Windows software. Vulnerabilities in this software may be exploited to gain unauthorized access to security-critical systems. A number of studies have analyzed the robustness of software that run on Unix systems. The results of these studies have pointed to vulnerabi...

متن کامل

Securing The Kernel Via Static Binary Rewriting, Program Shepherding And Partial Control Flow Integrity

Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many of the kernel vulnerabilities are still exploitable. Successful kernel exploitation typically grants the attacker maximum privilege level and results in total machine compromise. To protect against kernel exploitation,...

متن کامل

Design and Development of a Command-line Tool for Portable Executable File Analysis and Malware Detection in IoT Devices

Recently, Microsoft unveiled a new operating system called Windows 10. As it is highly expected that Windows 10 will play a significant role in the Internet of Things era, the Portable Executable (PE) format is drawing attention even more widely than before. PE is a standard file format for executables and object code used in MS Windows operating systems. Since a number of various malwares have...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011