COMPUTER SECURITY FOR CODE REGENERATION TECHNIQUES IN HIGH LEVEL LANGUAGES

KADAM P.A.1*, KURUNDKAR G.D.2*, KHAMITKAR S.D.3*
1Department of Computer Application I.T.M. College, Nanded
2Department of Computer Science S.G.B College, Purna (Jn.)
3Director, School of Computational Sciences S.R.T.M. University, Nanded
* Corresponding Author : s_khamitkar@yahoo.com

Received : -     Accepted : -     Published : 01-11-2011
Volume : 1     Issue : 1       Pages : 6 - 9
Int J Cryptography Secur 1.1 (2011):6-9

Keywords : Bluetooth, base band module, scrambler.
Conflict of Interest : None declared

Cite - MLA : KADAM P.A., et al "COMPUTER SECURITY FOR CODE REGENERATION TECHNIQUES IN HIGH LEVEL LANGUAGES." International Journal of Cryptography and Security 1.1 (2011):6-9.

Cite - APA : KADAM P.A., KURUNDKAR G.D., KHAMITKAR S.D. (2011). COMPUTER SECURITY FOR CODE REGENERATION TECHNIQUES IN HIGH LEVEL LANGUAGES. International Journal of Cryptography and Security, 1 (1), 6-9.

Cite - Chicago : KADAM P.A., KURUNDKAR G.D., and KHAMITKAR S.D. "COMPUTER SECURITY FOR CODE REGENERATION TECHNIQUES IN HIGH LEVEL LANGUAGES." International Journal of Cryptography and Security 1, no. 1 (2011):6-9.

Copyright : © 2011, KADAM P.A., et al, Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

In this paper we are going to explain the concept of computer security. And also the concept of code regeneration. Now a days heavy use of computer network (Internet) Due to heavy use of internet the problem arises for computer to maintaining security. The awareness of the need for tools and techniques to aid in computer security analysis of binary code, such as the understanding of viruses, Trojans, worms, backdoors and general security flaws, (all these concept related to computer security ) in order to provide immediate solutions with or without the aid of software vendors. This paper is a proposal for a high-level debugging tool to be used by computer security experts, which will reduce the amount of time needed in order to solve security-related problems in executable programs. The current state of the art involves the tracing of thousands of lines of assembly code using a standard debugger. A highlevel debugger would be capable of displaying a high-level representation of an executable program in the C language, hence reducing the number of lines that need to be inspected by an order of magnitude (i.e. hundreds instead of thousands of lines). Effectively, these techniques will help in reducing the amount of time needed to trace a security flaw in an executable program, as well as reducing the costs of acquiring or training skilled assembler engineers allowing software designers to use any software language and compiler. Our approach uses a back-end partitioning tool that utilizes regeneration techniques to recover important high-level information, resulting in performance comparable to high-level compiler-based approaches.

References

[1] I. V. Costov and K. Filipoya K., “Design of electronics using VHDL described with example of based band and LMP layers in Bluetooth”, IEEE Electronics Technology, vol. 3, pp. 453- 456, May 2004  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] R. Ahola, D. Wallner and M. Sida, “Bluetooth Transceiver Design with VHDL-AMS”, in Proc. DAT, 2003, paper 1530- 1591, p. 20268.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] http://www.icgst.com  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] I. Chun, B. Kim and I. Park, “A Fully Synthesizable Bluetooth Base band module for a system-on-a-chip”, ETRI Journal, vol. 25, pp. 328-336, Oct. 2003.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] G.M. Bhat, M. Mustafa, S. Ahmad and J. Ahmad, “VHDL modeling and simulation of data scrambler and descrambler for secure data communication”, INDIAN Journal of Science and Technology, vol. 2, pp. 41-43, Oct. 2009.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus