DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Cha, Sang Kil | - |
dc.contributor.advisor | 차상길 | - |
dc.contributor.advisor | Kang, Brent Byung Hoon | - |
dc.contributor.advisor | 강병훈 | - |
dc.contributor.author | Faerevaag, Markus Veie | - |
dc.date.accessioned | 2019-09-04T02:47:51Z | - |
dc.date.available | 2019-09-04T02:47:51Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=843575&flag=dissertation | en_US |
dc.identifier.uri | http://hdl.handle.net/10203/267099 | - |
dc.description | 학위논문(석사) - 한국과학기술원 : 전산학부, 2019.2,[iii, 69 p. :] | - |
dc.description.abstract | This thesis presents a study of how to securely execute untrusted code. With web browsers being used to execute potentially malicious code for millions of users worldwide, its security is paramount. Designing and implementing new security techniques are inherently challenging, partly due to the complexity of modern browsers. Therefore a set of design principles for building interpreters are designed, using the language Haskell coupled with the building blocks of monad transformers. The implemented framework, named Bowser, serves as proof that interpreters can in fact be secure by design, and that extending it with new security mechanisms is easily achieved. This is demonstrated by adding dynamic taint analysis to the designed framework, with the goal of mitigating common attacks extracting sensitive information. | - |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | Monad transformers▼ataint analysis▼ajavascript engine | - |
dc.subject | 모나드 변환자▼a테인트 분석▼a자바스크립트 엔진 | - |
dc.title | Securely executing malicious code | - |
dc.title.alternative | 악성코드의 안전한 실행에 대하여 | - |
dc.type | Thesis(Master) | - |
dc.identifier.CNRN | 325007 | - |
dc.description.department | 한국과학기술원 :전산학부, | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.