Dissertations / Theses on the topic 'Security Monitors'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 36 dissertations / theses for your research on the topic 'Security Monitors.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Khoury, Raphaël. "Enforcing Security Policies with Runtime Monitors." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28124/28124.pdf.
Full textExecution monitoring is an approach that seeks to allow an untrusted code to run safely by observing its execution and reacting if need be to prevent a potential violation of a user-supplied security policy. This method has many promising applications, particularly with respect to the safe execution of mobile code. Academic research on monitoring has generally focused on two questions. The first, relates to the set of policies that can be enforced by monitors under various constraints and the conditions under which this set can be extended. The second question deals with the way to inline a monitor into an untrusted or potentially malicious program in order to produce a new instrumented program that provably respects the desired security policy. This study builds on the two strands of research mentioned above and brings new insights to this study. It seeks, in the first place, to increase the scope of monitorable properties by suggesting a new approach of monitor inlining. By drawing on an a priori model of the program’s possible behavior, we develop a monitor that can enforce a strictly larger set of security properties. Furthermore, longstanding research has showed that a monitor that is allowed to transform its input is more powerful than one lacking this ability. Naturally, this ability must be constrained for the enforcement to be meaningful. Otherwise, if the monitor is given too broad a leeway to transform valid and invalid sequences, any property can be enforced, but not in a way that is useful or desirable. In this study, we propose two new enforcement paradigms which capture reasonable restrictions on a monitor’s ability to alter its input. We study the set of properties enforceable if these enforcement paradigms are used and give examples of real-life security policies that can be enforced using our approach.
Shankaranarayanan, Bharath. "Assertion-Based Monitors for Run-time Security Validation." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1626356515627044.
Full textJoglekar, Sachin P. "Embedded monitors for detecting and preventing intrusions in cryptographic and application protocols." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4414/.
Full textRaja, Subashree. "Security Architecture and Dynamic Signal Selection for Post-Silicon Validation." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1623241837129969.
Full textVermeulen, Hester. "A balanced food basket approach to monitor food affordability in South Africa." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73175.
Full textThesis (PhD) - University of Pretoria. 2020.
Financial support received from: * The Bureau for Food and Agricultural Policy (BFAP) * The Department of Science and Technology (DST)/National Research Foundation (NRF) Centre of Excellence (CoE) in Food Security * Agbiz * Red Meat Research and Development South Africa (RMRD SA) * DST/NRF South African Research Chairs Initiative (SARChl) in the National Development Plan Priority Area of Nutrition and Food Security (Unique number: SARCI170808259212) * University of Pretoria
Animal and Wildlife Sciences
PhD Nutrition
Unrestricted
Nauditt, Alexandra. "Understanding stream flow generation in sparsely monitored montane catchments." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=233935.
Full textLeon, Vidalon Igmar, and Ampuero Pablo Jorge Medina. "Mejora al Proceso de Monitoreo Continuo de Vulnerabilidades." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/652805.
Full textThis research work aims to improve the Continuous Vulnerability Monitoring process of Technology Security Operations management, which greatly contributes to being prevented and greatly mitigating any problem that may take advantage of an external and internal threat from Mibanco. This research work contains six chapters, the main ones being the definition of the Theoretical Framework, the main concepts, antecedents were developed and the key words related to the main topic of this research work were defined; In the Project Development chapter the problem will be shown in more detail where the main problem is formulated and the improvement objective which would be focused on the substantial reduction of time with the support of information technologies.
Tesis
Lu, Lu. "IoT Network Watchdog." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34008.
Full textPASQUIER, JEAN-BAPTISTE. "Remote surveys to monitor IDPs leaving displacement sites : A case study in the eastern DR Congo." Thesis, KTH, Industriell ekologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-179640.
Full textPatzina, Lars Verfasser], Andy [Akademischer Betreuer] Schürr, and Jan [Akademischer Betreuer] [Jürjens. "Generierung von effizienten Security-/Safety-Monitoren aus modellbasierten Beschreibungen / Lars Patzina. Betreuer: Andy Schürr ; Jan Jürjens." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2014. http://d-nb.info/1110979053/34.
Full textPatzina, Lars [Verfasser], Andy Akademischer Betreuer] Schürr, and Jan [Akademischer Betreuer] [Jürjens. "Generierung von effizienten Security-/Safety-Monitoren aus modellbasierten Beschreibungen / Lars Patzina. Betreuer: Andy Schürr ; Jan Jürjens." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2014. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-41334.
Full textNemati, Hamed. "Secure System Virtualization : End-to-End Verification of Memory Isolation." Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213030.
Full textQC 20170831
PROSPER
HASPOC
Otoum, Safa. "Machine Learning-driven Intrusion Detection Techniques in Critical Infrastructures Monitored by Sensor Networks." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39090.
Full textCarter, Zachary Negual. "A Principled Approach to Policy Composition for Runtime Enforcement Mechanisms." Scholar Commons, 2012. http://scholarcommons.usf.edu/etd/4006.
Full textPatzina, Sven Verfasser], Andy [Akademischer Betreuer] Schürr, and Jan [Akademischer Betreuer] [Jürjens. "Entwicklung einer Spezifikationssprache zur modellbasierten Generierung von Security-/Safety-Monitoren zur Absicherung von (Eingebetteten) Systemen / Sven Patzina. Betreuer: Andy Schürr ; Jan Jürjens." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2014. http://d-nb.info/1110979029/34.
Full textPatzina, Sven [Verfasser], Andy Akademischer Betreuer] Schürr, and Jan [Akademischer Betreuer] [Jürjens. "Entwicklung einer Spezifikationssprache zur modellbasierten Generierung von Security-/Safety-Monitoren zur Absicherung von (Eingebetteten) Systemen / Sven Patzina. Betreuer: Andy Schürr ; Jan Jürjens." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2014. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-41327.
Full textChávez, Luna Manuel Ángel, and Jara Armando Victor Paredes. "Propuesta de una Arquitectura de Software para la Mejora del Proceso de Gestión de Monitoreo de Controles de Seguridad." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/652804.
Full textThe objective of this research work is to provide a Software for the management of security controls and monitoring of the National Comprehensive Program for Families well-being - INABIF, following practices of predictive approach, process analysis, structure of the business, construction and software design. The proposed model will provide a software design that optimizes the tasks associated with the control and study of the organization's security controls. Also, for the development of the proposed work, a business analysis will be presented, which, through the Zachman methodology, it will present a high-level view of the organization's business line, its strategic objectives, and its current positioning. The approach will be visible from the point of view of the study process, knowing the role it plays within the company's macro processes, following the company's objectives, as well as the degree of responsibility assigned to it. Once deficient tasks have been identified, the system will generate case studies (based on the unified modeling language), which represent the behavior of the system that the software design must support. Finally, under design quality guidelines, modeling tools will be used to define the structure of this proposal, thereby guaranteeing quality of analysis, design and compliance with objectives set by the organization.
Tesis
Stamenkovich, Joseph Allan. "Enhancing Trust in Autonomous Systems without Verifying Software." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/89950.
Full textMaster of Science
Autonomous systems are surprisingly vulnerable, not just from malicious hackers, but from design errors and oversights. The lines of code required can quickly climb into the millions, and the artificial decision algorithms can be inscrutable and fully dependent upon the information they are trained on. These factors cause the verification of the core software running our autonomous cars, drones, and everything else to be prohibitively difficult by traditional means. Independent safety monitors are implemented to provide internal oversight for these autonomous systems. A semi-automatic design process efficiently creates error-free monitors from safety rules drones need to follow. These monitors remain separate and isolated from the software typically controlling the system, but use the same sensor information. They are embedded in the circuitry and act as their own small, task-specific processors watching to make sure a particular rule is not violated; otherwise, they take control of the system and force corrective behavior. The monitors are added to a consumer off-the-shelf (COTS) drone to demonstrate their effectiveness. For every rule monitored, an override is triggered when they are violated. Their effectiveness depends on reliable sensor information as with any electronic component, and the completeness of the rules detailing these monitors.
Fahlström, Albin, and Victor Henriksson. "Intrångsdetektering i processnätverk." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-39881.
Full textHoten mot industrinätverken har blivit större vilket har ställt högre krav på industriernas cybersäkerhet. Industrinätverk är ofta inte konstruerade med cybersäkerhet i åtanke, vilket har gjort dessa system sårbara mot attacker. Även om nätverkets yttre skydd anses gott går det inte att vara säker på att ett industrinätverk förblir osmittat. Detta ställer krav på någon form av intrångsdetekteringssystem (IDS) som kan upptäcka infekterad utrustning och suspekt datatrafik i nätverket. En IDS skannar alla paket vid en viss punkt i nätverket, om IDS:en upptäcker något paket som matchar med dess signatur kommer den att larma en administratör. IDS:en kan även använda beteendeanalys där den larmar om nätverksaktiviteten avviker från det normala. Det är mycket viktigt att en IDS inte orsakar avbrott i industriprocessen, om en process stannar kan det innebära stora kostnader för industrin. Denna rapport syftar till att lämna ett lösningsförslag på en IDS-implementation till ett av Mälarenergi AB: s processnätverk, lösningen konstruerades med hjälp av IDS:erna Bro och Snort.
Vissa bilder i den elektroniska rapporten har tagits bort av upphovrättsliga skäl. Författarna har bedömt att rapporten är förståelig även utan dessa bilder.
Laos, Barrantes Jorge Augusto, and Flores Marcos Jefferson Mauricio. "Sistema de monitoreo de seguridad y salud en el trabajo para una empresa constructora empleando redes neuronales MLP para el análisis de imágenes en obras." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2021. http://hdl.handle.net/10757/657548.
Full textOccupational safety and health for a construction company is an important part of missionary processes seen from a human perspective, as well as an economic one. In this sense, with this project a system solution is proposed, taking as a starting point the business information (process map) to carry out the analysis and design of a monitoring system for safety and health at work using artificial intelligence neural networks MLP for the analysis of images in construction sites. In general, the objective of the proposal is to reduce accidents and with this the expenses (7% of income) that have been presented in the execution of works for payment of fines, penalties or for breach of contracts. In the first stage, the analysis of the company's information is carried out with the help of Zachman and TOGAF framework, in this way the current situation of the process “Management and control of construction sites” is known, identifying the problems or weaknesses that it has, with this information, the analysis of the improvement proposal is carried out. The next stage is based on designing the solution proposal starting from the identification of system requirements together with the business user, having this information, the functional and non-functional drivers of the system are identified, finally the system design is carried out using the model C4, expressing the software architecture at 4 levels of approximation.
Tesis
Freitas, Pablo Gulias Rufino de. "Seguran?a da informa??o e QoS na gest?o de redes de telecomunica??es em conformidade com as pr?ticas de ITIL?" Pontif?cia Universidade Cat?lica de Campinas, 2017. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/976.
Full textMade available in DSpace on 2017-08-08T12:17:56Z (GMT). No. of bitstreams: 1 PABLO GULIAS RUFINO DE FREITAS.pdf: 2140333 bytes, checksum: 1e937a0df855e15ff38bbf36da286844 (MD5) Previous issue date: 2017-05-02
Pontif?cia Universidade Cat?lica de Campinas ? PUC Campinas
Traditionally, Information Security (IS) and Quality of Service (QoS), which means the capacity of a service to satisfy the needs of a user, have been considered separately, with different purposes and needs. However, the service levels that are advertised and expected for both are strongly linked. In this sense, despite the improvement in the performance of communication and of the confidentiality, integrity and the availability of data trafficked having greater premise, there still is no standardization for the joint and efficient use of IS and QoS. There are also no defined metrics or indicators that allow for this grouped measurement. This study proposed and tested a model for the management of communication networks, based on the best practices of the library for Information Technology Service Management (ITSM), Information Technology Infrastructure Library (ITIL), having the novelty of using the information security risk management process, from the 27005 (Risk Management) standard, in conjunction with a list of requirements checks of QoS and controls from the 27002 (Code of Practice) standard. This study looks to find the equilibrium between IS, performance and productivity. The results obtained showed the effectiveness of this proposal decreasing by approximately 16%, the number of incidents directly linked to IS and QoS, detected and solved in a proactive manner.
Tradicionalmente, Seguran?a da Informa??o (SI) e Qualidade de Servi?o (Quality of Service (QoS)), que significa a capacidade de um servi?o para satisfazer as necessidades do usu?rio, t?m sido consideradas, separadamente, com diferentes prop?sitos e necessidades. No entanto, os n?veis de servi?os anunciados e esperados por ambos est?o fortemente ligados. Nesse sentido, apesar da melhoria no desempenho da comunica??o e da confidencialidade, integridade e disponibilidade dos dados transportados serem premissas maiores, ainda n?o h? uma padroniza??o para um uso conjunto e eficiente entre SI e QoS. Tamb?m n?o h? uma defini??o de m?tricas ou indicadores que possibilitem essa medi??o agrupada. No presente trabalho, prop?e-se e testa-se um modelo de gerenciamento de redes de telecomunica??es, baseado nas melhores pr?ticas da biblioteca de Gerenciamento de Servi?os de Tecnologia da Informa??o (GSTI), Information Technology Infrastructure Library (ITIL), tendo como novidade a utiliza??o do processo de gest?o de riscos de seguran?a da informa??o, da norma 27005 (Gest?o de riscos), em conjun??o com uma lista de verifica??es de requisitos de QoS e controles da norma 27002 (C?digo de pr?ticas). Este trabalho busca o equil?brio entre SI, desempenho e produtividade. Os resultados obtidos mostraram a efetividade da proposta com uma diminui??o aproximada de 16%, da quantidade de incidentes diretamente ligados ? SI e QoS, detectados e solucionados de forma proativa.
Kumarapillai, Chandrikakutty Harikrishnan. "Protecting Network Processors with High Performance Logic Based Monitors." 2013. https://scholarworks.umass.edu/theses/1054.
Full textSayed, Bassam. "Protection against malicious JavaScript using hybrid flow-sensitive information flow monitoring." Thesis, 2015. http://hdl.handle.net/1828/7063.
Full textGraduate
Ryan, Christopher Michael. "Determining the Impact of Concrete Roadways on Gamma Ray Background Readings for Radiation Portal Monitoring Systems." Thesis, 2011. http://hdl.handle.net/1969.1/ETD-TAMU-2011-05-9341.
Full textYang, Chang Yo, and 楊長祐. "Distributed and Mobile Security Monitor System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/45025742917668342585.
Full text長庚大學
資訊工程學系
98
Taiwan’s elderly population is being increased year by year. Today the fall accidents have become one of important causes of death forelderly. More and more elder communities have installed high-securityvideo surveillance system to insure the safety for elders. Thesesurveillance systems, however, almost need employ guards or care-staffs to watch the monitors artificially. Some high-and systems apply the imageprocessing techniques to automatically identify if there are exceptional events appeared in the monitors. Such systems, however, will have performance bottlenecks on image processing. In addition, the convention video surveillance systems lack better emergence alarming mechanism in case an elder falling incident occurs. For this reason, we will adopt a hierarchical framework to implement a falling detection system with distributed image processing and data flow control. Through distributed image processing, it will effectively reduce the burden on Server. Also, the Server will perform data flow control forthe data stream collected by all cameras based on Round-Robin principles. The most important is, through the combination of mobile applicationsscreening on highrisk factors of the diseases, and personnel positioningmechanism , the system will support more complete services for elder safety. With the development of this system, we make the fall-accidentdetection from occurring to alarming in a very short delay time . And wewill take into account physiological conditions for seperate elderly to give more accurate , personal services. Our goal is to hope the elderly can do activities more confidently and safely in the community.
Wang, Shun-Hung, and 王舜弘. "Design of a monitor security system based on chaotic synchronization." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/01588888006257809631.
Full text樹德科技大學
電腦與通訊系碩士班
100
Due to the events of social security, home security issue is very important. Locks are the first line of defense to prevent theft. Thus the design of high security locks is very important. In addition, the monitoring system can provide real-time monitor and record all abnormal conditions, to make the best processing and can effectively reduce the loss of life and property. Firstly, we study the design of high-security locks which utilize the noise-like characteristics and synchronization of chaotic systems. A switching mechanism to change the response speed of chaotic systems is proposed in this study. The user can change the key by different switching mechanism, so that the key is no longer fixed. The shortcomings of the mechanical lock and electronic lock are released. Secondly, we proposed the monitor security system which combines the chaos-based lock and real-time video monitoring system. This proposed monitor security system can keep records of the image files in the home space and effectively enhance the monitoring and surveillance function.
Chung, Tine-Shiang, and 鍾天祥. "Assessment of the Construction Project of Barrack Security Monitor System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/87946697967276462031.
Full text華梵大學
工業工程與經營資訊學系碩士班
99
Security monitoring system plays a significant role in barrack security. Considering limited filming area, poor quality images, short storage time can not satisfy the growing demand for high quality images, high definition images and large storage space, the upgrade of the capabilities mentioned above is necessary to fit the current needs of security monitoring equipment and improve the shortage of the manpower and barrack security. Based on hierarchy scoring method, this research creates monitoring system structure and evaluation criteria in order to find the most appropriate program. Besides, this research adopts SMART as evaluation decision to find out the weighted scoring method and group decision making through which concrete suggestions and evaluations could be made. Then the majority rule is applied to access the importance of each structure under the evaluation criteria and their performance and to further prioritize the selections. According to the research result, three structures are prioritized based on the hierarchical structure, which include function demand structure, cost structure, and system integration structure. In the end, three evaluation results, no needs to change, partially change and change completely, are acquired. This research explores how to find out the most appropriate program for buildup of the monitoring system in terms of function demand structure, cost structure and system integration structure. Based on the criteria brought up by the group decision making, statistics, and prioritization, a best selection could be found and provides reference for future studies regarding construction of barrack monitoring system.
黃廷宇. "A Network-based Security Analyzer for the Remote Medical Monitor Devices." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/zjf69j.
Full textChen, Bor-Chyan, and 陳柏謙. "The Design of a Security Monitor for Wireless Local Area Networks." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/36238024023882220243.
Full text國立交通大學
資訊工程系
91
Wireless Local Area Networks (wireless LANs) are local area networks (LANs) where data are transmitted by radio waves. One can easily collect all the transmissions within a wireless LAN without any physical contact with the LAN devices (hubs or switches). As a result, security mechanisms such as encryption and authentication are necessary for wireless LANs. However, the current security standard for wireless LANs is not secure enough, and customized security solutions may become obsolete in the future when the new security standard is available. Therefore, we do not invent any new security standard to replace the existing one. Instead, we develop a security program that can easily compatible with any security solution. In this thesis, we describe the design of a program called Wireless LAN Monitor. This program can act as a sniffer that listens data transmissions in a wireless LAN. In addition, this program can actively send faked messages to affect the wireless LAN. By applying these two basic functions, this program can provide two advanced functions, which are “Connection Breaking” and “SYN Flooding Defense”, without modifying existing network devices. We describe all the functions in this thesis and present the experimental results on the efficiency of the two advanced functions.
Patzina, Lars. "Generierung von effizienten Security-/Safety-Monitoren aus modellbasierten Beschreibungen." Phd thesis, 2014. http://tuprints.ulb.tu-darmstadt.de/4133/7/20141110_Thesis_Lars_Patzina_Final.pdf.
Full textHui, Yeh-yu, and 葉毓輝. "Auto Detection of Illegal IP Connect and Monitor Mechanism for Information Security." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/26944457490303173953.
Full text國立臺灣科技大學
資訊管理系
96
Information security is getting more important for corporations and government. Although most of the companies have set firewall and IDS system, but it can only protect and detect illegal user hacking in the network from the external network. The system can not detect employees from the company using fake IP to hack into the network. To solve the problem, I have combined the ARP WATCH with DHCP to build a system that can stop illegal IP connection automatically. In addition, the system is capable to supervise firewall system, web log, SQL Injection and XXS (Cross Site Scripting) which hackers usually use to break in the network. The software monitors the system, analysis data on spot which prevents MIS to make mistake and ensures higher security level for the network.
MOHOSINA, AMATUL. "DESERVE: A FRAMEWORK FOR DETECTING PROGRAM SECURITY VULNERABILITY EXPLOITATIONS." Thesis, 2011. http://hdl.handle.net/1974/6734.
Full textThesis (Master, Electrical & Computer Engineering) -- Queen's University, 2011-09-19 19:04:28.423
Maserumule, Ngwanadira Tebogo. "Parent's use of strategies to monitor children's activities online." Thesis, 2017. https://hdl.handle.net/10539/24336.
Full textAlthough studies have been conducted on the effectiveness of different types of filtering software, limited knowledge is available on parents’ use of strategies to monitor their children’s activities online. Thus, identifying understanding parents’ use of strategies to monitor children’s activities online and the extent in which parents use content filtering software will contribute to the body of knowledge. The purpose of this study is to understand parent’s use of strategies to monitor children’s activities online and the extent in which they use content filtering software in Gauteng Province, South Africa. The study adopted a Social Cognitive Theory to develop a conceptual framework and identify existing theoretical concepts. The conceptual framework adapted Bandura’s (2001) framework to inform data analysis. Data were collected through semi-structured interviews and qualitative, thematic content analysis was used for data analyses. The results of the study indicated that parents do use various strategies to monitor children’s activities online and further apply knowledge, experience, and social support as a rationale for using those strategies. The study further revealed that there is a gap between parents, technology industry and government regarding the use of content filtering software. Thus, the study recommends parents, industry and government work together to protecting children online through various strategies and address the concerns regarding the use of content filtering software. Parents’ need to understand the importance of content filtering software and discuss this with their children to be able to protect them online without restricting access to relevant information. Keywords: Harmful content, blocking, strategies, filtering, online content, software, use, non-use, strategies
GR2018
Lopes, José Pedro Silva. "Ontology-driven metamodeling towards hypervisor design automation: runtime security and data integrity." Master's thesis, 2017. http://hdl.handle.net/1822/59264.
Full textOne of the most popular cyber-attack vectors to compromise computer systems is related to memory corruption. Memory corruption is one of the most prevalent and devastating vulnerabilities. The widespread adoption of virtualization technology in embedded systems generally and naively accepts Virtual Machine Manager (VMM) or hypervisor software as the Trusted Computing Base (TCB). As a software component, vulnerabilities can still be present, allowing attackers to subvert it alike Operating Systems (OSs). Virtualization empowers mixed-criticality embedded systems by executing critical and non-critical tasks under the same hardware. Therefore, security and safety are critical in their design as attacks on real-time embedded systems software can put lives in danger and/or cause enormous financial losses. Disregarding code-injection attacks, memory corruption exploits consist of: control- and noncontrol- data attacks. In practice, code-injection attacks are prevented with a W E policy which defines memory regions either as writable or executable, as Memory Protection Unit (MMU) hardware is now commonly available. Throughout this work, the focus is mainly on non-controldata attacks. Nevertheless, control-data attacks are also tackled with Control-Flow Integrity (CFI) enforcement. This thesis uncovers a tailor-made security solution enforcing data integrity in the μRTZVisor VMM, according to a specification devised by the developer. The Zynq-7000 System on Chip (SoC) was leveraged to isolate a remote integrity monitor from the hypervisor, in a separate core. Through compile-time instrumentation, execution traces are collected, recording updates to critical static variables on μRTZVisor. The monitor audits these traces by searching for violations of data integrity rules, concurrently to hypervisor’s execution. Automating the deployment of the devised security mechanism is required to facilitate its adoption. Using ontologies for knowledge representation, information related to the security mechanism and the data aspect of the μRTZVisor software is modeled into a specifically designed meta-model. Ontologies uniformize knowledge representation and aid maintainability. By inserting the modeling efforts into the SeML modeling infrastructure, code generation capabilities are leveraged to generate implementation-specific files.
Um dos mais populares vetores de ataque a comprometer os sistemas computacionais é a exploração de vulnerabilidades de corrupção de memória. Estas vulnerabilidades, além de bastante comuns, podem ter efeitos devastadores. A difusão da tecnologia de virtualização em sistemas embebidos assume, ingenuamente, o software VMM como pertencendo à TCB. No entanto, podem ainda existir vulnerabilidades, permitindo aos atacantes subverter os mecanismos de segurança. A virtualização permite a criação de sistemas embebidos de criticidade mista, executando funções criticas e não criticas na mesma plataforma. Por esta razão, a segurança é essencial na conceção dos mesmos. Ataques a sistemas embebidos críticos podem ter efeitos devastadores como a perda de vidas humanas e/ou enormes perdas económicas. Não considerando ataques que injetam código novo no programa, existem duas maneiras de explorar vulnerabilidades de corrupção de memória: ataques a dados de controlo e aos restantes dados do programa. Na prática, ataques que inserem código novo são prevenidos com uma política de W E, em que segmentos da memória são classificados como executáveis ou passiveis de serem escritos. Essa política é aplicada pelo hardware MMU que se encontra atualmente presente numa vasta gama de sistemas. O foco deste trabalho inside principalmente em ataques não direcionados aos dados de controlo. No entanto, estes ataques também são considerados através da implementação de um mecanismo de CFI. Esta tese propõe uma solução de segurança, especialmente concebida para o μRTZVisor, que providencia integridade de dados de acordo com uma especificação concebida pelo desenvolvedor. Utilizando o SoC Zynq-7000, o monitor é isolado num core diferente do utilizado pelo software de virtualização. Através da inserção de instrumentação em tempo de compilação, é efetuado um registo das operações de escrita em variáveis criticas do μRTZVisor. O monitor remoto audita o registo à procura de violações na especificação de integridade de dados providenciada. A automação da aplicação do mecanismo de segurança proposto é necessária para facilitar a sua adoção. Utilizando ontologias como linguagem de representação de conhecimento, informação relacionada com os mecanismos de segurança e o plano de dados do software de virtualização são modelados num meta-modelo desenvolvido neste trabalho. A utilização de ontologias uniformiza a representação de conhecimento e a manutenção do mesmo. Através da inserção dos esforços de modelação na infraestrutura de modelação SeML, são ainda utilizados mecanismos de geração de código para gerar ficheiros de implementação.
-Hung, Wu-Hung, and 洪文宏. "Evaluating the efficiency of the security policy in Taichung City Police Bureau in terms of monitor system." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/08621927041270319751.
Full textPatzina, Sven. "Entwicklung einer Spezifikationssprache zur modellbasierten Generierung von Security-/Safety-Monitoren zur Absicherung von (Eingebetteten) Systemen." Phd thesis, 2014. http://tuprints.ulb.tu-darmstadt.de/4132/1/20141119_Thesis_SvenPatzina_Final.pdf.
Full text