Matches in SemOpenAlex for { <https://semopenalex.org/work/W168271011> ?p ?o ?g. }
Showing items 1 to 96 of
96
with 100 items per page.
- W168271011 abstract "Protecting software integrity is a key to successfully maintain its own credibility and reduce the financial and technical risks caused from a lack of integrity. Although researchers have been putting effort on improving software development techniques and preventing human errors during the software development process, it is still a daunting task to make non-vulnerable software in practice. For example, the national vulnerability database shows that a set of new software vulnerabilities are discovered every day. Since developing non-vulnerable software is hardly achievable, in this research, we look for a way to achieve software integrity while they are used. In particular, this dissertation investigates three mechanisms to protect software integrity at runtime. Firstly, this dissertation presents a protection mechanism that can thwart attacks that try to exploit memory corruption vulnerabilities of software. The protection mechanism is provided by randomizing the program's runtime memory address layout and the memory objects. As a result, it hinders memory corruption attacks by preventing an attacker being able to easily predict their target addresses. The protection mechanism is implemented by a novel binary rewriting tool that can randomly place the code and data segments of programs and perform fine-grained permutation of function bodies in the code segment as well as global variables in the data segment. Our evaluation results show minimal performance overhead with orders of magnitude improvement in randomness. Secondly, this dissertation investigates a vulnerability identification mechanism named as CBones that can discover how unknown vulnerabilities in C programs are exploited by verifying program structural constraints. CBones automatically extracts a set of program structural constraints via binary analysis of the compiled program executable. CBone then verifies these constraints while it monitors the program execution to detect and isolate the security bugs. Our evaluation with real-world applications that known to have vulnerabilities shows that CBones can discover all integrity vulnerabilities with no false alarms, pinpoint the corrupting instructions, and provide information to facilitate the understanding of how an attack exploits a security bug. Lastly, this dissertation identifies the need of dynamic attestation to overcome the limitations of existing remote attestation approaches. To the best of our knowledge, we are the first to introduce the notion of dynamic attestation and propose use of dynamic system properties to provide the integrity proof of a running system. To validate our idea, we develop an application-level dynamic attestation system named as ReDAS (Remote Dynamic Attestation System) that can verify runtime integrity of software. ReDAS provides the integrity evidence of runtime applications by checking their dynamic properties: structural integrity and global data integrity. These properties are collected from each application, representing the application's unique runtime behavior that must be satisfied at runtime. ReDAS also uses hardware support provided by TPM to protect the integrity evidence from potential attacks. Our evaluation with real-world applications shows that ReDAS is effective in capturing runtime integrity violations with zero false alarms, and demonstrates that ReDAS incurs 8% overhead on average while performing integrity measurements." @default.
- W168271011 created "2016-06-24" @default.
- W168271011 creator A5016753473 @default.
- W168271011 creator A5068310253 @default.
- W168271011 date "2008-01-01" @default.
- W168271011 modified "2023-10-06" @default.
- W168271011 title "Mechanisms for protecting software integrity in networked systems" @default.
- W168271011 cites W1112477 @default.
- W168271011 cites W132371169 @default.
- W168271011 cites W1504669610 @default.
- W168271011 cites W1522824317 @default.
- W168271011 cites W1545927878 @default.
- W168271011 cites W1593678010 @default.
- W168271011 cites W1993619753 @default.
- W168271011 cites W2076317514 @default.
- W168271011 cites W2077688407 @default.
- W168271011 cites W2099613071 @default.
- W168271011 cites W2104948281 @default.
- W168271011 cites W2108860402 @default.
- W168271011 cites W2110908283 @default.
- W168271011 cites W2111817346 @default.
- W168271011 cites W2117009500 @default.
- W168271011 cites W2128274900 @default.
- W168271011 cites W2138049420 @default.
- W168271011 cites W2145377152 @default.
- W168271011 cites W2146431583 @default.
- W168271011 cites W2156858199 @default.
- W168271011 cites W2157235311 @default.
- W168271011 cites W2161600851 @default.
- W168271011 cites W2162800072 @default.
- W168271011 cites W2164490659 @default.
- W168271011 cites W2166004296 @default.
- W168271011 cites W2167804035 @default.
- W168271011 cites W2529367775 @default.
- W168271011 cites W3047310265 @default.
- W168271011 cites W80938964 @default.
- W168271011 cites W906418744 @default.
- W168271011 hasPublicationYear "2008" @default.
- W168271011 type Work @default.
- W168271011 sameAs 168271011 @default.
- W168271011 citedByCount "2" @default.
- W168271011 countsByYear W1682710112016 @default.
- W168271011 crossrefType "journal-article" @default.
- W168271011 hasAuthorship W168271011A5016753473 @default.
- W168271011 hasAuthorship W168271011A5068310253 @default.
- W168271011 hasConcept C111919701 @default.
- W168271011 hasConcept C115903868 @default.
- W168271011 hasConcept C165696696 @default.
- W168271011 hasConcept C22680326 @default.
- W168271011 hasConcept C2777904410 @default.
- W168271011 hasConcept C29983905 @default.
- W168271011 hasConcept C38652104 @default.
- W168271011 hasConcept C41008148 @default.
- W168271011 hasConcept C527648132 @default.
- W168271011 hasConcept C529173508 @default.
- W168271011 hasConcept C62913178 @default.
- W168271011 hasConcept C95713431 @default.
- W168271011 hasConceptScore W168271011C111919701 @default.
- W168271011 hasConceptScore W168271011C115903868 @default.
- W168271011 hasConceptScore W168271011C165696696 @default.
- W168271011 hasConceptScore W168271011C22680326 @default.
- W168271011 hasConceptScore W168271011C2777904410 @default.
- W168271011 hasConceptScore W168271011C29983905 @default.
- W168271011 hasConceptScore W168271011C38652104 @default.
- W168271011 hasConceptScore W168271011C41008148 @default.
- W168271011 hasConceptScore W168271011C527648132 @default.
- W168271011 hasConceptScore W168271011C529173508 @default.
- W168271011 hasConceptScore W168271011C62913178 @default.
- W168271011 hasConceptScore W168271011C95713431 @default.
- W168271011 hasLocation W1682710111 @default.
- W168271011 hasOpenAccess W168271011 @default.
- W168271011 hasPrimaryLocation W1682710111 @default.
- W168271011 hasRelatedWork W1492366453 @default.
- W168271011 hasRelatedWork W2114619419 @default.
- W168271011 hasRelatedWork W2154902280 @default.
- W168271011 hasRelatedWork W2181917222 @default.
- W168271011 hasRelatedWork W2508667123 @default.
- W168271011 hasRelatedWork W2597705742 @default.
- W168271011 hasRelatedWork W2601109594 @default.
- W168271011 hasRelatedWork W2614917062 @default.
- W168271011 hasRelatedWork W2773418733 @default.
- W168271011 hasRelatedWork W2884410253 @default.
- W168271011 hasRelatedWork W2897174340 @default.
- W168271011 hasRelatedWork W2912219367 @default.
- W168271011 hasRelatedWork W2963952522 @default.
- W168271011 hasRelatedWork W3081520195 @default.
- W168271011 hasRelatedWork W3098629950 @default.
- W168271011 hasRelatedWork W3125299868 @default.
- W168271011 hasRelatedWork W3168299165 @default.
- W168271011 hasRelatedWork W3209117895 @default.
- W168271011 hasRelatedWork W3212661259 @default.
- W168271011 hasRelatedWork W971477461 @default.
- W168271011 isParatext "false" @default.
- W168271011 isRetracted "false" @default.
- W168271011 magId "168271011" @default.
- W168271011 workType "article" @default.