Inter-process communication, analysis, guidelines and its impact on computer security
Date Issued
2010
Author(s)
Spasov, Zoran
Madevska Bogdanova, Ana
Abstract
In this paper we look at the inter-process communication
(IPC) also known as inter-thread or inter-application
communication from other knowledge sources. We will look
and analyze the different types of IPC in the Microsoft
Windows operating system, their implementation and the
usefulness of this kind of approach in the terms of
communication between processes. Only local
implementation of the IPC will be addressed in this paper.
Special emphasis will be given to the system mechanisms that
are involved with the creation, management, and use of
named pipes and sockets.
This paper will discuss some of the IPC options and
techniques that are available to Microsoft Windows
programmers. We will make a comparison between Microsoft
remoting and Microsoft message queues (pros and cons).
Finally we will make some notes and remarks regarding
several issues and concerns about the security of the local
system when using these methods, in order to use this
knowledge in building a system that will control processes
within different desktop environments. At the end, we will
give some conclusions about the implementation and use of
the IPC methods, including local security guidelines.
(IPC) also known as inter-thread or inter-application
communication from other knowledge sources. We will look
and analyze the different types of IPC in the Microsoft
Windows operating system, their implementation and the
usefulness of this kind of approach in the terms of
communication between processes. Only local
implementation of the IPC will be addressed in this paper.
Special emphasis will be given to the system mechanisms that
are involved with the creation, management, and use of
named pipes and sockets.
This paper will discuss some of the IPC options and
techniques that are available to Microsoft Windows
programmers. We will make a comparison between Microsoft
remoting and Microsoft message queues (pros and cons).
Finally we will make some notes and remarks regarding
several issues and concerns about the security of the local
system when using these methods, in order to use this
knowledge in building a system that will control processes
within different desktop environments. At the end, we will
give some conclusions about the implementation and use of
the IPC methods, including local security guidelines.
File(s)![Thumbnail Image]()
Loading...
Name
7CiiT-11.pdf
Size
331.4 KB
Format
Adobe PDF
Checksum
(MD5):03dcf3a3cdc7fd7d5455f70cbbd5365d
