Securely executing malicious code악성코드의 안전한 실행에 대하여

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 339
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorCha, Sang Kil-
dc.contributor.advisor차상길-
dc.contributor.advisorKang, Brent Byung Hoon-
dc.contributor.advisor강병훈-
dc.contributor.authorFaerevaag, Markus Veie-
dc.date.accessioned2019-09-04T02:47:51Z-
dc.date.available2019-09-04T02:47:51Z-
dc.date.issued2019-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=843575&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/267099-
dc.description학위논문(석사) - 한국과학기술원 : 전산학부, 2019.2,[iii, 69 p. :]-
dc.description.abstractThis thesis presents a study of how to securely execute untrusted code. With web browsers being used to execute potentially malicious code for millions of users worldwide, its security is paramount. Designing and implementing new security techniques are inherently challenging, partly due to the complexity of modern browsers. Therefore a set of design principles for building interpreters are designed, using the language Haskell coupled with the building blocks of monad transformers. The implemented framework, named Bowser, serves as proof that interpreters can in fact be secure by design, and that extending it with new security mechanisms is easily achieved. This is demonstrated by adding dynamic taint analysis to the designed framework, with the goal of mitigating common attacks extracting sensitive information.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectMonad transformers▼ataint analysis▼ajavascript engine-
dc.subject모나드 변환자▼a테인트 분석▼a자바스크립트 엔진-
dc.titleSecurely executing malicious code-
dc.title.alternative악성코드의 안전한 실행에 대하여-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :전산학부,-
Appears in Collection
CS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0