Building Trusted Computer Systems via Unified Software Integrity Protection

The task of protecting software integrity can be approached with a two-part strategy that addresses threats to the static integrity of memory contents and the dynamic integrity of software memory interactions. Although their resultant effects are realized in fundamentally different ways, attacks on...

Full description

Bibliographic Details
Other Authors: Jenkins, Jonathan (authoraut)
Format: Others
Language:English
English
Published: Florida State University
Subjects:
Online Access:http://purl.flvc.org/fsu/fd/FSU_migr_etd-9623
id ndltd-fsu.edu-oai-fsu.digital.flvc.org-fsu_253092
record_format oai_dc
spelling ndltd-fsu.edu-oai-fsu.digital.flvc.org-fsu_2530922020-06-18T03:08:15Z Building Trusted Computer Systems via Unified Software Integrity Protection Jenkins, Jonathan (authoraut) Burmester, Mike (professor directing dissertation) Mio, Washington (university representative) Haiduc, Sonia (committee member) Liu, Xiuwen, 1966- (committee member) Srinivasan, Ashok (committee member) Florida State University (degree granting institution) College of Arts and Sciences (degree granting college) Department of Computer Science (degree granting department) Text text Florida State University Florida State University English eng 1 online resource (263 pages) computer application/pdf The task of protecting software integrity can be approached with a two-part strategy that addresses threats to the static integrity of memory contents and the dynamic integrity of software memory interactions. Although their resultant effects are realized in fundamentally different ways, attacks on either memory contents manipulated by instructions or the operation of software are both damaging and facilitate further attack. The ability to alter the static memory state (programs, configuration data, etc.) of software opens an attack vector as broad as the capabilities of the attacker. Altering the operation of running programs (e.g. control flow) allows an attacker to divert the results (memory effects) of the target program from those which were intended by the program author. Neither static nor dynamic analyses of integrity are alone sufficient to completely describe the integrity of trusted system software. Further, there is a characteristic facilitation of vulnerabilities between the two classes of software integrity in that common security violations are decomposed as sequences of static and dynamic integrity violations which have enabling relationships. In order to capture and provide a unified software integrity, this work will analyze software integrity and detail techniques to enable protections to be applied by a coherent, systematic frame- work directly to the memory and memory interactions which exhibit software integrity rather than tailored to each member of an evolving set of particular threats. A Dissertation submitted to the Department of Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Summer Semester, 2015. April 20, 2015. Software Integrity Includes bibliographical references. Mike Burmester, Professor Directing Dissertation; Washington Mio, University Representative; Sonia Haiduc, Committee Member; Xiuwen Liu, Committee Member; Ashok Srinivasan, Committee Member. Computer science FSU_migr_etd-9623 http://purl.flvc.org/fsu/fd/FSU_migr_etd-9623 This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). The copyright in theses and dissertations completed at Florida State University is held by the students who author them. http://diginole.lib.fsu.edu/islandora/object/fsu%3A253092/datastream/TN/view/Building%20Trusted%20Computer%20Systems%20via%20Unified%20Software%20Integrity%20Protection.jpg
collection NDLTD
language English
English
format Others
sources NDLTD
topic Computer science
spellingShingle Computer science
Building Trusted Computer Systems via Unified Software Integrity Protection
description The task of protecting software integrity can be approached with a two-part strategy that addresses threats to the static integrity of memory contents and the dynamic integrity of software memory interactions. Although their resultant effects are realized in fundamentally different ways, attacks on either memory contents manipulated by instructions or the operation of software are both damaging and facilitate further attack. The ability to alter the static memory state (programs, configuration data, etc.) of software opens an attack vector as broad as the capabilities of the attacker. Altering the operation of running programs (e.g. control flow) allows an attacker to divert the results (memory effects) of the target program from those which were intended by the program author. Neither static nor dynamic analyses of integrity are alone sufficient to completely describe the integrity of trusted system software. Further, there is a characteristic facilitation of vulnerabilities between the two classes of software integrity in that common security violations are decomposed as sequences of static and dynamic integrity violations which have enabling relationships. In order to capture and provide a unified software integrity, this work will analyze software integrity and detail techniques to enable protections to be applied by a coherent, systematic frame- work directly to the memory and memory interactions which exhibit software integrity rather than tailored to each member of an evolving set of particular threats. === A Dissertation submitted to the Department of Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy. === Summer Semester, 2015. === April 20, 2015. === Software Integrity === Includes bibliographical references. === Mike Burmester, Professor Directing Dissertation; Washington Mio, University Representative; Sonia Haiduc, Committee Member; Xiuwen Liu, Committee Member; Ashok Srinivasan, Committee Member.
author2 Jenkins, Jonathan (authoraut)
author_facet Jenkins, Jonathan (authoraut)
title Building Trusted Computer Systems via Unified Software Integrity Protection
title_short Building Trusted Computer Systems via Unified Software Integrity Protection
title_full Building Trusted Computer Systems via Unified Software Integrity Protection
title_fullStr Building Trusted Computer Systems via Unified Software Integrity Protection
title_full_unstemmed Building Trusted Computer Systems via Unified Software Integrity Protection
title_sort building trusted computer systems via unified software integrity protection
publisher Florida State University
url http://purl.flvc.org/fsu/fd/FSU_migr_etd-9623
_version_ 1719320864977059840