Memory management systems are essential components of any operating system, responsible for managing the allocation and deallocation of memory resources to applications, ensuring that each process has access to the necessary memory to execute efficiently. However, memory management systems are not immune to security vulnerabilities. This paper presents a critical review of security issues in memory management systems. The review covers the different types of attacks, the vulnerabilities that can be exploited, and the techniques that can be used to mitigate them. The paper also provides a comprehensive review of the literature on memory management system security, focusing on recent research and developments in the field.
Download PDF
References
- Akkus, I. E., & Ning, P. (2012). A comparative study of kernel-level rootkits in Windows and Linux. In Proceedings of the 19th Annual Network and Distributed System Security Symposium (pp. 1-15).
- Bhatia, S., Gupta, S., & Jain, S. (2011). Security issues in virtual memory management. International Journal of Computer Applications, 21(9), 21-28.
- Jafri, H., & Lakhotia, A. (2012). Design and implementation of a secure kernel. International Journal of Computer Applications, 51(2), 7-14.
- Li, Y., Li, L., Wang, Y., & Cheng, Y. (2011). Enhancing system security through virtual memory protection. In Proceedings of the International Conference on Network and System Security (pp. 341-346).
- Niranjan, M., & Sinha, A. (2012). An efficient approach for detecting and preventing memory corruption attacks. In Proceedings of the 2012 International Conference on Computer Communication and Informatics (pp. 1-6).
- Pang, L., Luo, Y., & Dong, Y. (2012). Memory protection in embedded systems with a software-based memory management unit. IEEE Transactions on Computers, 61(2), 250-262.
- Rai, N., & Shukla, A. (2011). A survey of memory management and protection techniques. International Journal of Computer Science and Information Technologies, 2(2), 330-337.
- Srivastava, A., & Trivedi, A. K. (2011). Detection and prevention of stack-based buffer overflow attacks. International Journal of Computer Applications, 30(4), 16-21.
- Wang, Y., & Zhao, Q. (2012). Security enhancement of operating system by applying virtualization technology. In Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (Vol. 3, pp. 269-273).
- Yang, L., Huang, Y., & Yang, H. (2011). Study on buffer overflow detection and defense technology. In Proceedings of the International Conference on Computer Science and Information Processing (pp. 424-427).
Back