Sökning: "untrusted software"

Visar resultat 1 - 5 av 6 avhandlingar innehållade orden untrusted software.

  1. 1. Lightweight Enforcement of Fine-Grained Security Policies for Untrusted Software

    Författare :Phu Phung; Chalmers University of Technology; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; security policy enforcement; JavaScript security; web-application security; vehicle software security; untrusted software;

    Sammanfattning : This thesis presents an innovative approach to implementing a security enforcement mechanism in the contexts of untrusted software systems, where a piece of code in a base system may come from an untrusted third party. The key point of the approach is that it is lightweight in the sense that it does not need an additional policy language or extra tool. LÄS MER

  2. 2. Lightweight Inlined Reference Monitors for Securing Extensible and Open Systems

    Författare :Phu Phung; Chalmers University of Technology; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Security; Inlined Reference Monitors; JavaScript; Vehicle Software Security;

    Sammanfattning : This thesis studies an alternative implementation of asecurity reference monitor in the contexts of extensible and opensystems. A security reference monitor is a classic approach to imposing asecurity policy on an otherwise untrusted system by using a trusted componentwhich intercepts security-relevant resource requests and applies a securitypolicy to decide whether to grant such requests. LÄS MER

  3. 3. No Hypervisor Is an Island : System-wide Isolation Guarantees for Low Level Code

    Författare :Oliver Schwarz; Mads Dam; Christian Gehrmann; Gerwin Klein; KTH; []
    Nyckelord :NATURAL SCIENCES; NATURVETENSKAP; NATURVETENSKAP; NATURAL SCIENCES; Platform Security; Hypervisor; Formal Verification; Theorem Proving; HOL4; DMA; Peripheral Devices; Instruction Set Architectures; ISA; Information Flow; Boot; Datalogi; Computer Science;

    Sammanfattning : The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come from criminals, competitors, and government agencies. Some of them are very skilled and very targeted in their attacks. LÄS MER

  4. 4. Architecture for programmable network infrastructure

    Författare :Tom Barbette; Laurent Matht; University of Liege; []
    Nyckelord :ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; networking; high-speed; dpdk; netmap; click; fastclick; middleclick; nfv; sdn; dataplane; parallelism; Datalogi; Computer Science;

    Sammanfattning : Software networking promises a more flexible network infrastructure, poised to leverage the computational power available in datacenters. Virtual Net- work Functions (VNF) can now run on commodity hardware in datacenters instead of using specialized equipment disposed along the network path. LÄS MER

  5. 5. Inlined Reference Monitors : Certification,Concurrency and Tree Based Monitoring

    Författare :Andreas Lundblad; Mads Dam; Gul Agha; KTH; []
    Nyckelord :NATURAL SCIENCES; NATURVETENSKAP; NATURVETENSKAP; NATURAL SCIENCES; Runtime monitoring; policy enforcement; tree automata; monitor inlining; certification; concurrency;

    Sammanfattning : Reference monitor inlining is a technique for enforcing security policies by injecting security checks into the untrusted software in a style similar to aspect-oriented programming. The intention is that the injected code enforces compliance with the policy (security), without adding behavior (conservativity) or affecting existing policy compliant behavior (transparency). LÄS MER