Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Jenkins, J. (2015). Building Trusted Computer Systems via Unified Software Integrity Protection. Retrieved from http://purl.flvc.org/fsu/fd/FSU_migr_etd-9623
The task of protecting software integrity can be approached with a two-part strategy that addresses threats to the static integrity of memory contents and the dynamic integrity of software memory interactions. Although their resultant effects are realized in fundamentally different ways, attacks on either memory contents manipulated by instructions or the operation of software are both damaging and facilitate further attack. The ability to alter the static memory state (programs, configuration data, etc.) of software opens an attack vector as broad as the capabilities of the attacker. Altering the operation of running programs (e.g. control flow) allows an attacker to divert the results (memory effects) of the target program from those which were intended by the program author. Neither static nor dynamic analyses of integrity are alone sufficient to completely describe the integrity of trusted system software. Further, there is a characteristic facilitation of vulnerabilities between the two classes of software integrity in that common security violations are decomposed as sequences of static and dynamic integrity violations which have enabling relationships. In order to capture and provide a unified software integrity, this work will analyze software integrity and detail techniques to enable protections to be applied by a coherent, systematic frame- work directly to the memory and memory interactions which exhibit software integrity rather than tailored to each member of an evolving set of particular threats.
A Dissertation submitted to the Department of Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy.
Bibliography Note
Includes bibliographical references.
Advisory Committee
Mike Burmester, Professor Directing Dissertation; Washington Mio, University Representative; Sonia Haiduc, Committee Member; Xiuwen Liu, Committee Member; Ashok Srinivasan, Committee Member.
Publisher
Florida State University
Identifier
FSU_migr_etd-9623
Use and Reproduction
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). The copyright in theses and dissertations completed at Florida State University is held by the students who author them.
Jenkins, J. (2015). Building Trusted Computer Systems via Unified Software Integrity Protection. Retrieved from http://purl.flvc.org/fsu/fd/FSU_migr_etd-9623