You are here

Building Trusted Computer Systems via Unified Software Integrity Protection

Title: Building Trusted Computer Systems via Unified Software Integrity Protection.
76 views
35 downloads
Name(s): Jenkins, Jonathan, author
Burmester, Mike, professor directing dissertation
Mio, Washington, university representative
Haiduc, Sonia, committee member
Liu, Xiuwen, 1966-, committee member
Srinivasan, Ashok, committee member
Florida State University, degree granting institution
College of Arts and Sciences, degree granting college
Department of Computer Science, degree granting department
Type of Resource: text
Genre: Text
Issuance: monographic
Date Issued: 2015
Publisher: Florida State University
Place of Publication: Tallahassee, Florida
Physical Form: computer
online resource
Extent: 1 online resource (263 pages)
Language(s): English
Abstract/Description: The task of protecting software integrity can be approached with a two-part strategy that addresses threats to the static integrity of memory contents and the dynamic integrity of software memory interactions. Although their resultant effects are realized in fundamentally different ways, attacks on either memory contents manipulated by instructions or the operation of software are both damaging and facilitate further attack. The ability to alter the static memory state (programs, configuration data, etc.) of software opens an attack vector as broad as the capabilities of the attacker. Altering the operation of running programs (e.g. control flow) allows an attacker to divert the results (memory effects) of the target program from those which were intended by the program author. Neither static nor dynamic analyses of integrity are alone sufficient to completely describe the integrity of trusted system software. Further, there is a characteristic facilitation of vulnerabilities between the two classes of software integrity in that common security violations are decomposed as sequences of static and dynamic integrity violations which have enabling relationships. In order to capture and provide a unified software integrity, this work will analyze software integrity and detail techniques to enable protections to be applied by a coherent, systematic frame- work directly to the memory and memory interactions which exhibit software integrity rather than tailored to each member of an evolving set of particular threats.
Identifier: FSU_migr_etd-9623 (IID)
Submitted Note: A Dissertation submitted to the Department of Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy.
Degree Awarded: Summer Semester, 2015.
Date of Defense: April 20, 2015.
Keywords: Software Integrity
Bibliography Note: Includes bibliographical references.
Advisory Committee: Mike Burmester, Professor Directing Dissertation; Washington Mio, University Representative; Sonia Haiduc, Committee Member; Xiuwen Liu, Committee Member; Ashok Srinivasan, Committee Member.
Subject(s): Computer science
Persistent Link to This Record: http://purl.flvc.org/fsu/fd/FSU_migr_etd-9623
Owner Institution: FSU

Choose the citation style.
Jenkins, J. (2015). Building Trusted Computer Systems via Unified Software Integrity Protection. Retrieved from http://purl.flvc.org/fsu/fd/FSU_migr_etd-9623