DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Kang, Brent Byung Hoon | - |
dc.contributor.advisor | 강병훈 | - |
dc.contributor.author | Jang, Daehee | - |
dc.date.accessioned | 2019-08-25T02:48:21Z | - |
dc.date.available | 2019-08-25T02:48:21Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=842417&flag=dissertation | en_US |
dc.identifier.uri | http://hdl.handle.net/10203/265362 | - |
dc.description | 학위논문(박사) - 한국과학기술원 : 정보보호대학원, 2019.2,[v, 59 p. :] | - |
dc.description.abstract | This thesis introduces defense approaches for protecting system memory integrity against various adversary models. The adversary models are categorized into three folds: (i) fully-privileged, (ii) partiallyprivileged, and (iii) zero-privileged adversary model. The fully privileged adversary model assumes that an attacker has the capability of executing highest-privileged (e.g., supervisor mode) arbitrary code to harm the memory integrity (e.g., rootkit). The partially privileged adversary model assumes that the attacker is only capable of executing limited set of instructions (e.g., memory access instructions). The zero-privileged adversary model assumes the memory integrity violation by an attacker is caused due to unintended software vulnerabilities while executing benign codes. The thesis analyzes the details of each threat against memory integrity and proposes defense solution correspondingly. | - |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | Memory▼aOS▼aRootkit▼aVulnerability▼aHeap | - |
dc.subject | 메모리▼a운영체제▼a루트킷▼a취약점▼a힙 | - |
dc.title | Fortifying memory integrity for each adversary’s privilege level | - |
dc.title.alternative | 시스템 공격자 권한에 따른 메모리 무결성 보호 방법론 | - |
dc.type | Thesis(Ph.D) | - |
dc.identifier.CNRN | 325007 | - |
dc.description.department | 한국과학기술원 :정보보호대학원, | - |
dc.contributor.alternativeauthor | 장대희 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.