Understanding and protecting closed-source systems through dynamic analysis
In this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior in the field. First, we introduce a novel technique for uncovering the constrain...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
Georgia Institute of Technology
2015
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/53012 |
id |
ndltd-GATECH-oai-smartech.gatech.edu-1853-53012 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-GATECH-oai-smartech.gatech.edu-1853-530122015-02-21T03:33:45ZUnderstanding and protecting closed-source systems through dynamic analysisDolan-Gavitt, BrendanVirtualizationSecurityReverse engineeringIn this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior in the field. First, we introduce a novel technique for uncovering the constraints actually used in OS kernels to decide whether a given instance of a kernel data structure is valid. Next, we tackle the semantic gap problem in virtual machine security: we present a pair of systems that allow, on the one hand, automatic extraction of whole-system algorithms for collecting information about a running system, and, on the other, the rapid identification of “hook points” within a system or program where security tools can interpose to be notified of security-relevant events. Finally, we present and evaluate a new dynamic measure of code similarity that examines the content of the data handled by the code, rather than the syntactic structure of the code itself. This problem has implications both for understanding the capabilities of novel malware as well as understanding large binary code bases such as operating system kernels.Georgia Institute of TechnologyLee, Wenke2015-01-12T20:47:24Z2015-01-12T20:47:24Z2014-122014-08-22December 20142015-01-12T20:47:24ZDissertationapplication/pdfhttp://hdl.handle.net/1853/53012en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
topic |
Virtualization Security Reverse engineering |
spellingShingle |
Virtualization Security Reverse engineering Dolan-Gavitt, Brendan Understanding and protecting closed-source systems through dynamic analysis |
description |
In this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior in the field. First, we introduce a novel technique for uncovering the constraints actually used in OS kernels to decide whether a given instance of a kernel data structure is valid. Next, we tackle the semantic gap problem in virtual machine security: we present a pair of systems that allow, on the one hand, automatic extraction of whole-system algorithms for collecting information about a running system, and, on the other, the rapid identification of “hook points” within a system or program where security tools can interpose to be notified of security-relevant events. Finally, we present and evaluate a new dynamic measure of code similarity that examines the content of the data handled by the code, rather than the syntactic structure of the code itself. This problem has implications both for understanding the capabilities of novel malware as well as understanding large binary code bases such as operating system kernels. |
author2 |
Lee, Wenke |
author_facet |
Lee, Wenke Dolan-Gavitt, Brendan |
author |
Dolan-Gavitt, Brendan |
author_sort |
Dolan-Gavitt, Brendan |
title |
Understanding and protecting closed-source systems through dynamic analysis |
title_short |
Understanding and protecting closed-source systems through dynamic analysis |
title_full |
Understanding and protecting closed-source systems through dynamic analysis |
title_fullStr |
Understanding and protecting closed-source systems through dynamic analysis |
title_full_unstemmed |
Understanding and protecting closed-source systems through dynamic analysis |
title_sort |
understanding and protecting closed-source systems through dynamic analysis |
publisher |
Georgia Institute of Technology |
publishDate |
2015 |
url |
http://hdl.handle.net/1853/53012 |
work_keys_str_mv |
AT dolangavittbrendan understandingandprotectingclosedsourcesystemsthroughdynamicanalysis |
_version_ |
1716730984563474432 |