KADAM P.A.1*, KURUNDKAR G.D.2*, KHAMITKAR S.D.3*
1Department of Computer Application I.T.M. College, Nanded
2Department of Computer Science S.G.B College, Purna (Jn.)
3Director, School of Computational Sciences S.R.T.M. University, Nanded
* Corresponding Author : s_khamitkar@yahoo.com
Received : - Accepted : - Published : 01-11-2011
Volume : 1 Issue : 1 Pages : 6 - 9
Int J Cryptography Secur 1.1 (2011):6-9
Keywords : Bluetooth, base band module, scrambler.
Conflict of Interest : None declared
In this paper we are going to explain the concept of computer security. And also the concept of code regeneration. Now a days heavy use of computer network (Internet) Due to heavy use of internet the problem arises for computer to maintaining security. The awareness of the need for tools and techniques to aid in computer security analysis of binary code, such as the understanding of viruses, Trojans, worms, backdoors and general security flaws, (all these concept related to computer security ) in order to provide immediate solutions with or without the aid of software vendors. This paper is a proposal for a high-level debugging tool to be used by computer security experts, which will reduce the amount of time needed in order to solve security-related problems in executable programs. The current state of the art involves the tracing of thousands of lines of assembly code using a standard debugger. A highlevel debugger would be capable of displaying a high-level representation of an executable program in the C language, hence reducing the number of lines that need to be inspected by an order of magnitude (i.e. hundreds instead of thousands of lines). Effectively, these techniques will help in reducing the amount of time needed to trace a security flaw in an executable program, as well as reducing the costs of acquiring or training skilled assembler engineers allowing software designers to use any software language and compiler. Our approach uses a back-end partitioning tool that utilizes regeneration techniques to recover important high-level information, resulting in performance comparable to high-level compiler-based approaches.
[1] I. V. Costov and K. Filipoya K., “Design of electronics using
VHDL described with example of based band and LMP layers
in Bluetooth”, IEEE Electronics Technology, vol. 3, pp. 453-
456, May 2004
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[2] R. Ahola, D. Wallner and M. Sida, “Bluetooth Transceiver
Design with VHDL-AMS”, in Proc. DAT, 2003, paper 1530-
1591, p. 20268.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[3] http://www.icgst.com
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[4] I. Chun, B. Kim and I. Park, “A Fully Synthesizable Bluetooth
Base band module for a system-on-a-chip”, ETRI Journal, vol.
25, pp. 328-336, Oct. 2003.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[5] G.M. Bhat, M. Mustafa, S. Ahmad and J. Ahmad, “VHDL
modeling and simulation of data scrambler and descrambler for
secure data communication”, INDIAN Journal of Science and
Technology, vol. 2, pp. 41-43, Oct. 2009.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus