Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/489726
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialMemory behaviour based models for program integrity verification and anomaly detection against code reuse attacks
dc.date.accessioned2023-06-07T09:23:33Z-
dc.date.available2023-06-07T09:23:33Z-
dc.identifier.urihttp://hdl.handle.net/10603/489726-
dc.description.abstractReliability and usefulness of any computing system relies on the integrity newlineand correctness of the code running in the system. Any adversarial modification in newlinethe code causes execution integrity violations in the system, and causes behaviour newlineanomalies. The code may be modified statically using code injection methods or newlinealtered dynamically at run-time, to create attacks against the computing systems. newlineTechniques to detect the execution integrity violations rely on static newlinecode analysis models like Control Flow Integrity (CFI) solutions, taint tracking newlineand hardware based trusted computing platforms. CFI schemes keep the list newlineof valid control-flow target addresses as eligible target sets, and these target newlineaddresses are verified on each execution of the direct or indirect control transfer newlineinstructions, during execution. Taint tracking method intentionally insert some newlinespecial data-structures into the code at compile time, and the behaviour of these newlinedata structures are verified during execution. Trusted computing platforms ensure newlinecode integrity, but with the cost of additional hardware and storage. Even though newlinebasic CFI schemes are widely adopted in many systems, these techniques do not newlinepreserve Time Of Check To Time Of Use (TOCTTOU) consistency. Also, there newlineexist more advanced and application specific code reuse attack strategies like Data newlineOriented Programming (DOP) that bypass CFI checks. Solutions that deal with newlinethese types of attacks require compiler or hardware support and modifications. newlineThis thesis proposes strategies to detect run-time anomalies without any newlinehardware or software modification in the underlying machine or the application newlinecode. The broad objective of the thesis is to build a behaviour model that newlinedetects run- time anomalies in applications. The specific objective is to detect newlinethe non-control- data attacks created using Return Oriented Pro newline
dc.format.extentxiv, 113p.
dc.languageEnglish
dc.relationp.103-112
dc.rightsuniversity
dc.titleMemory behaviour based models for program integrity verification and anomaly detection against code reuse attacks
dc.title.alternative
dc.creator.researcherDileesh E D
dc.subject.keywordEngineering and Technology
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Artificial Intelligence
dc.subject.keywordrun- time anomalies
dc.subject.keywordControl Flow Integrity
dc.subject.keywordReliability
dc.description.note
dc.contributor.guideShanthi A P
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registered
dc.date.completed2022
dc.date.awarded2022
dc.format.dimensions21 cms
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File191.41 kBAdobe PDFView/Open
02_prelim.pdf1.16 MBAdobe PDFView/Open
03_content.pdf75.32 kBAdobe PDFView/Open
04_abstract.pdf48.4 kBAdobe PDFView/Open
05_chapter 1.pdf119.89 kBAdobe PDFView/Open
06_chapter 2.pdf186.26 kBAdobe PDFView/Open
07_chapter 3.pdf677.79 kBAdobe PDFView/Open
08_chapter 4.pdf824.03 kBAdobe PDFView/Open
09_chapter 5.pdf378.22 kBAdobe PDFView/Open
10_annexures.pdf381.79 kBAdobe PDFView/Open
80_recommendation.pdf194.8 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: