Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/489726
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Memory behaviour based models for program integrity verification and anomaly detection against code reuse attacks | |
dc.date.accessioned | 2023-06-07T09:23:33Z | - |
dc.date.available | 2023-06-07T09:23:33Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/489726 | - |
dc.description.abstract | Reliability and usefulness of any computing system relies on the integrity newlineand correctness of the code running in the system. Any adversarial modification in newlinethe code causes execution integrity violations in the system, and causes behaviour newlineanomalies. The code may be modified statically using code injection methods or newlinealtered dynamically at run-time, to create attacks against the computing systems. newlineTechniques to detect the execution integrity violations rely on static newlinecode analysis models like Control Flow Integrity (CFI) solutions, taint tracking newlineand hardware based trusted computing platforms. CFI schemes keep the list newlineof valid control-flow target addresses as eligible target sets, and these target newlineaddresses are verified on each execution of the direct or indirect control transfer newlineinstructions, during execution. Taint tracking method intentionally insert some newlinespecial data-structures into the code at compile time, and the behaviour of these newlinedata structures are verified during execution. Trusted computing platforms ensure newlinecode integrity, but with the cost of additional hardware and storage. Even though newlinebasic CFI schemes are widely adopted in many systems, these techniques do not newlinepreserve Time Of Check To Time Of Use (TOCTTOU) consistency. Also, there newlineexist more advanced and application specific code reuse attack strategies like Data newlineOriented Programming (DOP) that bypass CFI checks. Solutions that deal with newlinethese types of attacks require compiler or hardware support and modifications. newlineThis thesis proposes strategies to detect run-time anomalies without any newlinehardware or software modification in the underlying machine or the application newlinecode. The broad objective of the thesis is to build a behaviour model that newlinedetects run- time anomalies in applications. The specific objective is to detect newlinethe non-control- data attacks created using Return Oriented Pro newline | |
dc.format.extent | xiv, 113p. | |
dc.language | English | |
dc.relation | p.103-112 | |
dc.rights | university | |
dc.title | Memory behaviour based models for program integrity verification and anomaly detection against code reuse attacks | |
dc.title.alternative | ||
dc.creator.researcher | Dileesh E D | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Artificial Intelligence | |
dc.subject.keyword | run- time anomalies | |
dc.subject.keyword | Control Flow Integrity | |
dc.subject.keyword | Reliability | |
dc.description.note | ||
dc.contributor.guide | Shanthi A P | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | ||
dc.date.completed | 2022 | |
dc.date.awarded | 2022 | |
dc.format.dimensions | 21 cms | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 191.41 kB | Adobe PDF | View/Open |
02_prelim.pdf | 1.16 MB | Adobe PDF | View/Open | |
03_content.pdf | 75.32 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 48.4 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 119.89 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 186.26 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 677.79 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 824.03 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 378.22 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 381.79 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 194.8 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: