Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
Development of a Deliberately Vulnerable Linux Kernel
Author Name : Divya M, Allen Sam Anand, Dr. Shanthala P T, Archana B S, Sujitha P V
DOI: https://doi.org/10.56025/IJARESM.2024.1212242868
ABSTRACT The development of a deliberately prone Linux kernel module pursuits to offer a controlled surroundings for reading and addressing protection vulnerabilities in kernel-degree programming. This task specializes in deliberately introducing vulnerabilities which includes buffer overflows, stack overflows, and race situations right into a Linux kernel module to simulate actual-global protection weaknesses. The objective is to take advantage of those vulnerabilities the usage of numerous equipment and strategies, understand their effect, and suggest effective mitigation techniques. Through this challenge, we explore the lifecycle of vulnerabilities—from their creation and exploitation to the development of protection patches. The studies additionally entails the use of virtualization environments like QEMU for secure and remoted testing. By addressing these vulnerabilities, the project contributes to the broader subject of cybersecurity by means of equipping builders and researchers with the expertise required to design relaxed structures and respond to rising threats efficiently. This realistic method bridges the space between theoretical understanding and real-world implementation, providing a precious contribution to the domain of operating device protection