Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Protecting Software Execution by Dynamic Environment Hardening
Responsible organisation
2005 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Software has an important role in many systems, in particular in critical systems where the correct function of the larger system is of utmost importance. Software malfunction, or software exploits, that allow other system components or an adversary to control the execution of software, can cause significant damage to the system, and hence to what is controlled by the system. Due to the complexity in, and construction of, modern software systems, it is not sufficient to only analyze software source, such as source code, trying to find vulnerabilities that might enable exploits when executing. Instead, software protection must be extended with methods that consider the actual software execution, typically by executing in parallel with the software, and that protect the software as it executes. By using such methods, we can detect unwanted execution and protect against many exploits where the underlying vulnerability is difficult or impossible to find using only pre-execution, or static, methods. In this thesis, we present a methodology, and model for protecting software execution. We argue for the merits of dynamic methods, i.e. methods that consider the actual software execution, and we present a number of principles for how dynamic methods can be constructed. We also present three experiment systems that we have constructed, and show how the dynamic methods represented through these systems can be used to protect software execution and hence protect a system against exploits.

Place, publisher, year, edition, pages
Karlskrona: Blekinge Institute of Technology , 2005. , p. 114
Series
Blekinge Institute of Technology Licentiate Dissertation Series, ISSN 1650-2140 ; 12
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-00326Local ID: oai:bth.se:forskinfo904BF1276B462168C1257115004309FFISBN: 91-7295-069-2 (print)OAI: oai:DiVA.org:bth-00326DiVA, id: diva2:837725
Available from: 2012-09-18 Created: 2006-02-14 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(1764 kB)256 downloads
File information
File name FULLTEXT01.pdfFile size 1764 kBChecksum SHA-512
5d7bbb15395fbc68a2d1721e88bdf32f0fe9c1a23305e76ab4009558f5d13281b1906039be790335ed40a2ff003676362950a0abf5305bca27030de0cbf5b6c2
Type fulltextMimetype application/pdf

Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 256 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 470 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf