622 research outputs found

    Defense against buffer overflow attack by software design diversity

    Full text link
    A buffer overflow occurs during program execution when a fixed-size buffer has had too much data copied into it. This causes the data to overwrite into adjacent memory locations, and, depending on what is stored there, the behavior of the program itself might be affected; Attackers can select the value to place in the location in order to redirect execution to the location of their choice. If it contains machine code, the attacker causes the program to execute any arbitrary set of instructions---essentially taking control of the process. Successfully modifying the function return address allows the attacker to execute instructions with the same privileges as that of the attacked program; In this thesis, we propose to design software with multiple variants of the modules/functions. It can provide strong defense against the buffer overflow attack. A way can be provided to select a particular variant (implementation) of the module randomly when software is executed. This proves to be useful when an attacker designs the attack for a particular variant/implementation which may not be chosen in the random selection process during execution. It would be much difficult for the attacker to design an attack because of the different memory (stack-frame) layout the software could have every time it is executed

    Experimental and Kinetic Modeling Studies of Selective Catalytic Reduction of NOx with NH3 on Fe- and Cu-Zeolite Monolithic Catalysts

    Get PDF
    The selective catalytic reduction (SCR) of NOx with NH3 is considered to be the most promising technique for the efficient reduction of highly detrimental NOx (to N2) emitted from diesel engine vehicles. Amongst the various catalysts available for SCR, Fe- and Cu-zeolite catalysts are found to be highly stable and efficient towards maximum NOx reduction over a wide temperature range. Cu-zeolites are more active at low temperatures ( 400 oC). We carried out a comprehensive experimental and kinetic modeling study of key SCR reactions on Fe- and Cu-zeolite catalysts and present a detailed understanding of mass transfer limitations and kinetics and mechanistic aspects of various SCR reactions on these catalysts. Experiments carried out on monolith catalysts having different washcoat loadings, washcoat thicknesses and lengths indicate the presence of washcoat (or pore) diffusion limitations at intermediate to high temperature range in all the SCR reactions. A detailed analysis of the effect of temperature on the transitions between various controlling regimes (kinetic, washcoat diffusion and external mass transfer) is presented. Agreement in the differential kinetics studies of NO oxidation and standard SCR (NO + O2 + NH3) reactions indicates NO oxidation is the rate determining step for standard SCR. A detailed kinetic model capturing key features of all the SCR reactions is developed. This model accurately predicts the experimentally observed NOx conversions over a wide temperature range and different feed conditions. Finally, a systematic study of various SCR reactions is carried out on a combined system of Fe- and Cu-zeolite monolithic catalysts to determine if a high NOx conversion could be sustained over a wider temperature range than with individual Fe- and Cu-zeolite catalysts. Amongst various configurations, a dual-layer catalyst with a thin Fe-zeolite layer on top of a thick Cu-zeolite layer resulted in a very high NOx removal efficiency over a broad temperature range of practical interest. The kinetic model accurately captures the experimental data with a combined system of Fe- and Cu-zeolite catalysts and provides further insights into the catalyst arrangements for maximum NOx reduction efficiency.Chemical and Biomolecular Engineering, Department o

    Conceptual study of Dhamani - A critical review

    Get PDF
    Ayurveda is been practiced in India for at least 5000 years, but in present time it is becoming more popular in whole world due to its holistic approach. Acharyas has used an anatomical term Dhamani which is on controversial term. Ayurvedic text which are Ancient works in the field of Rachana presented by Acharya Sushruta, Charaka, Vaghbhata and other. Dhamani is a structure introduced by ducts with thin wall and carry Rasa all over the body i.e. Sharira. The term Dhamani generally used in same sense as Siras and Srotas. Interpretation of these Ayurvedic terminologies is confusing in many contexts. Acharya Sushruta clearly explained the constitution of the human body and difference between Sira (vein), Dhamani (artery), Srotas (capillaries). Dhamani is a specific anatomical structure by critically reviewing all possible literature both as per Ayurveda and modern science

    Implementation Paper Modern and Smart Logistic Vehicle Using Tracking and Security

    Get PDF
    The logistic organization structure have climbed beginning late with the improvement of global positioning system (GPS), helpful correspondence movements, sensor and remote structures association advancements. The collaborations of the administrators system are fundamental as they can add to a few points of enthusiasm, for example, proposing right places for getting clients, developing pay of truck drivers, reducing holding up time, vehicle downpours and besides compelling fuel utilization and from this time forward broadening the measure of treks the drivers can perform. The rule motivation driving this structure would supply required vehicles that would be utilized to meet client requests through the arranging, control and utilization of the noteworthy headway and cutoff of related data and associations from beginning to objective. Customer brings to the table start to finish security to client and supplier information by utilizing QR code thought. Customer is proposition of closest best specialist relationship as shown by client intrigue and recognize spam master network. Joint efforts association suggests the commitment and association of plan and direct structures to control the improvement and land masterminding of foul materials, work-in-process, and completed inventories at the most unimportant all out expense. Composed endeavours solidifies the relationship of enthusiasm organizing, stock, transportation, and the mix of warehousing, materials managing, and packaging, all joined all through an arrangement of workplaces

    Fighting viral infections and virus-driven tumors with cytotoxic CD4+ T cells

    Get PDF
    CD4+ T cells have been and are still largely regarded as the orchestrators of immune responses, being able to differentiate into distinct T helper cell populations based on differentiation signals, transcription factor expression, cytokine secretion, and specific functions. Nonetheless, a growing body of evidence indicates that CD4+ T cells can also exert a direct effector activity, which depends on intrinsic cytotoxic properties acquired and carried out along with the evolution of several pathogenic infections. The relevant role of CD4+ T cell lytic features in the control of such infectious conditions also leads to their exploitation as a new immunotherapeutic approach. This review aims at summarizing currently available data about functional and therapeutic relevance of cytotoxic CD4+ T cells in the context of viral infections and virus-driven tumors

    Fingerprint Recognition System: A Systematic Literature Review

    Get PDF
    The biometrics system is mainly focuses on fingerprint recognition and how this system would be implemented. If it is implemented in research area, this system would authenticate or contradict the uniqueness of each individual endeavouring to gain access to the research region with a given sum of precision.The method of authenticating a person's identity through a comparison of their fingerprints with previously captured samples is known as fingerprint recognition. Human finger impressions in the form of ridges and grooves are called fingerprints. The minutiae points, or the places where scars start or end, are used to locate fingerprints stored in the system. To create a minutiae template, these are further mapped with lines connecting them.An additional key challenge of this will understand the methods used to analysed the information from the scan. There are several different methods has been implemented by different researchers for the fingerprint recognition system. In this paper the literature of the different approaches are discussed
    corecore