Show simple item record

dc.identifier.urihttp://hdl.handle.net/1951/55382
dc.identifier.urihttp://hdl.handle.net/11401/70957
dc.description.sponsorshipThis work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree.en_US
dc.formatMonograph
dc.format.mediumElectronic Resourceen_US
dc.language.isoen_US
dc.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dc.typeThesis
dcterms.abstractToday's malware attacks are cleverly crafted and cause huge loss of resources. Existing proactive defense mechanisms against malware include isolation, sandboxing, information flow tracking, etc. These mechanisms completely block information flow on the system. But sometimes we do need the functionality provided by software from untrusted or unknown sources that are not malicious. The problem that we try to solve here is of executing this untrusted code on a real system so that it can coexist with other applications in the same environment, thus allowing safe information flow. At the same time we want to protect the system so that it does not get compromised due to untrusted information. Available approaches for information flow tracking are intrusive and require significant kernel changes, thus making them difficult to port and maintain across different operating systems or even newer version of the same OS. We propose a light-weight approach, based on userid, for proactive integrity protection and safe execution of untrusted code. We mediate all information flow in the system in order to provide protection from sophisticated malware and attacks.
dcterms.available2012-05-15T18:02:31Z
dcterms.available2015-04-24T14:45:17Z
dcterms.contributorR, Sekaren_US
dcterms.contributorScott Stolleren_US
dcterms.contributorRob Johnson.en_US
dcterms.creatorChandwani, Anupama Laxman
dcterms.dateAccepted2012-05-15T18:02:31Z
dcterms.dateAccepted2015-04-24T14:45:17Z
dcterms.dateSubmitted2012-05-15T18:02:31Z
dcterms.dateSubmitted2015-04-24T14:45:17Z
dcterms.descriptionDepartment of Computer Scienceen_US
dcterms.formatMonograph
dcterms.formatApplication/PDFen_US
dcterms.identifierChandwani_grad.sunysb_0771M_10131.pdfen_US
dcterms.identifierhttp://hdl.handle.net/1951/55382
dcterms.identifierhttp://hdl.handle.net/11401/70957
dcterms.issued2010-05-01
dcterms.languageen_US
dcterms.provenanceMade available in DSpace on 2012-05-15T18:02:31Z (GMT). No. of bitstreams: 1 Chandwani_grad.sunysb_0771M_10131.pdf: 518838 bytes, checksum: 2734e74e621b754cf274fb05e4182b83 (MD5) Previous issue date: 1en
dcterms.provenanceMade available in DSpace on 2015-04-24T14:45:17Z (GMT). No. of bitstreams: 3 Chandwani_grad.sunysb_0771M_10131.pdf.jpg: 1894 bytes, checksum: a6009c46e6ec8251b348085684cba80d (MD5) Chandwani_grad.sunysb_0771M_10131.pdf.txt: 77670 bytes, checksum: 31fb3077cc7ba4c035fa2229bc1bd397 (MD5) Chandwani_grad.sunysb_0771M_10131.pdf: 518838 bytes, checksum: 2734e74e621b754cf274fb05e4182b83 (MD5) Previous issue date: 1en
dcterms.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dcterms.subjectComputer Science
dcterms.subjectinformation flow policy, Linux, Secure installation, System integrity, userid
dcterms.titleLight-weight proactive approach for safe execution of untrusted code
dcterms.typeThesis


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record