Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
Integrity-Based Kernel Malware Detection, Feng Zhu
Integrity-Based Kernel Malware Detection, Feng Zhu
FIU Electronic Theses and Dissertations
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware.
We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: …
Two-Bit Pattern Analysis For Quantitative Information Flow, Ziyuan Meng
Two-Bit Pattern Analysis For Quantitative Information Flow, Ziyuan Meng
FIU Electronic Theses and Dissertations
Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively “small” enough to be …
Foundations Of Quantitative Information Flow: Channels, Cascades, And The Information Order, Barbara Espinoza Becerra
Foundations Of Quantitative Information Flow: Channels, Cascades, And The Information Order, Barbara Espinoza Becerra
FIU Electronic Theses and Dissertations
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret information. For this reason, the past decade has seen growing interest in quantitative theories of information flow that allow us to quantify the information being leaked. Within these theories, the system is modeled as an information-theoretic channel that specifies the probability of each output, given each input. Given a prior distribution on those inputs, entropy-like measures quantify the amount of information leakage caused by the channel.
This thesis presents new results in the theory of min-entropy leakage. First, we study the perspective of secrecy as …