Understanding and protecting closed-source systems through dynamic analysis

In this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior in the field. First, we introduce a novel technique for uncovering the constrain...

Full description

Bibliographic Details
Main Author: Dolan-Gavitt, Brendan
Other Authors: Lee, Wenke
Format: Others
Language:en_US
Published: Georgia Institute of Technology 2015
Subjects:
Online Access:http://hdl.handle.net/1853/53012
id ndltd-GATECH-oai-smartech.gatech.edu-1853-53012
record_format oai_dc
spelling ndltd-GATECH-oai-smartech.gatech.edu-1853-530122015-02-21T03:33:45ZUnderstanding and protecting closed-source systems through dynamic analysisDolan-Gavitt, BrendanVirtualizationSecurityReverse engineeringIn this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior in the field. First, we introduce a novel technique for uncovering the constraints actually used in OS kernels to decide whether a given instance of a kernel data structure is valid. Next, we tackle the semantic gap problem in virtual machine security: we present a pair of systems that allow, on the one hand, automatic extraction of whole-system algorithms for collecting information about a running system, and, on the other, the rapid identification of “hook points” within a system or program where security tools can interpose to be notified of security-relevant events. Finally, we present and evaluate a new dynamic measure of code similarity that examines the content of the data handled by the code, rather than the syntactic structure of the code itself. This problem has implications both for understanding the capabilities of novel malware as well as understanding large binary code bases such as operating system kernels.Georgia Institute of TechnologyLee, Wenke2015-01-12T20:47:24Z2015-01-12T20:47:24Z2014-122014-08-22December 20142015-01-12T20:47:24ZDissertationapplication/pdfhttp://hdl.handle.net/1853/53012en_US
collection NDLTD
language en_US
format Others
sources NDLTD
topic Virtualization
Security
Reverse engineering
spellingShingle Virtualization
Security
Reverse engineering
Dolan-Gavitt, Brendan
Understanding and protecting closed-source systems through dynamic analysis
description In this dissertation, we focus on dynamic analyses that examine the data handled by programs and operating systems in order to divine the undocumented constraints and implementation details that determine their behavior in the field. First, we introduce a novel technique for uncovering the constraints actually used in OS kernels to decide whether a given instance of a kernel data structure is valid. Next, we tackle the semantic gap problem in virtual machine security: we present a pair of systems that allow, on the one hand, automatic extraction of whole-system algorithms for collecting information about a running system, and, on the other, the rapid identification of “hook points” within a system or program where security tools can interpose to be notified of security-relevant events. Finally, we present and evaluate a new dynamic measure of code similarity that examines the content of the data handled by the code, rather than the syntactic structure of the code itself. This problem has implications both for understanding the capabilities of novel malware as well as understanding large binary code bases such as operating system kernels.
author2 Lee, Wenke
author_facet Lee, Wenke
Dolan-Gavitt, Brendan
author Dolan-Gavitt, Brendan
author_sort Dolan-Gavitt, Brendan
title Understanding and protecting closed-source systems through dynamic analysis
title_short Understanding and protecting closed-source systems through dynamic analysis
title_full Understanding and protecting closed-source systems through dynamic analysis
title_fullStr Understanding and protecting closed-source systems through dynamic analysis
title_full_unstemmed Understanding and protecting closed-source systems through dynamic analysis
title_sort understanding and protecting closed-source systems through dynamic analysis
publisher Georgia Institute of Technology
publishDate 2015
url http://hdl.handle.net/1853/53012
work_keys_str_mv AT dolangavittbrendan understandingandprotectingclosedsourcesystemsthroughdynamicanalysis
_version_ 1716730984563474432