Fortifying memory integrity for each adversary’s privilege level = 시스템 공격자 권한에 따른 메모리 무결성 보호 방법론

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 39
  • Download : 0
This thesis introduces defense approaches for protecting system memory integrity against various adversary models. The adversary models are categorized into three folds: (i) fully-privileged, (ii) partiallyprivileged, and (iii) zero-privileged adversary model. The fully privileged adversary model assumes that an attacker has the capability of executing highest-privileged (e.g., supervisor mode) arbitrary code to harm the memory integrity (e.g., rootkit). The partially privileged adversary model assumes that the attacker is only capable of executing limited set of instructions (e.g., memory access instructions). The zero-privileged adversary model assumes the memory integrity violation by an attacker is caused due to unintended software vulnerabilities while executing benign codes. The thesis analyzes the details of each threat against memory integrity and proposes defense solution correspondingly.
Advisors
Kang, Brent Byung Hoonresearcher강병훈researcher
Description
한국과학기술원 :정보보호대학원,
Publisher
한국과학기술원
Issue Date
2019
Identifier
325007
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 정보보호대학원, 2019.2,[v, 59 p. :]

Keywords

Memory▼aOS▼aRootkit▼aVulnerability▼aHeap; 메모리▼a운영체제▼a루트킷▼a취약점▼a힙

URI
http://hdl.handle.net/10203/265362
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=842417&flag=dissertation
Appears in Collection
IS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0