A Novel approach for countering information leakage based on virtualization / (Record no. 57083)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03439cam a2200337 a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | EG-GiCUC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250223031527.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160703s2016 ua f m 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | EG-GiCUC |
Language of cataloging | eng |
Transcribing agency | EG-GiCUC |
041 0# - LANGUAGE CODE | |
Language code of text/sound track or separate title | eng |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | Deposite |
097 ## - Thesis Degree | |
Thesis Level | Ph.D |
099 ## - LOCAL FREE-TEXT CALL NUMBER (OCLC) | |
Classification number | Cai01.18.02.Ph.D.2016.Om.N |
100 0# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Omar Hussein Sayed Mohamed |
245 12 - TITLE STATEMENT | |
Title | A Novel approach for countering information leakage based on virtualization / |
Statement of responsibility, etc. | Omar Hussein Sayed Mohamed ; Supervised Hesham Ahmed Hefny , Nermin Hamza Abdelghafar |
246 15 - VARYING FORM OF TITLE | |
Title proper/short title | نهج جديد لمواجهة تسريب المعلومات اعتمادا على الافتراضية |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Cairo : |
Name of publisher, distributor, etc. | Omar Hussein Sayed Mohamed , |
Date of publication, distribution, etc. | 2016 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 175 Leaves ; |
Dimensions | 30cm |
502 ## - DISSERTATION NOTE | |
Dissertation note | Thesis (Ph.D.) - Cairo University - Institute of Statistical Studies and Research- Department of Computer and Information Science |
520 ## - SUMMARY, ETC. | |
Summary, etc. | In traditional computer architecture, operating systems (OSs) are responsible for managing systems resources, handling processes requests to access the resources, and maintaining data privacy through process isolation. However, this architecture broadens the attack surface to include the whole software stack. This thesis exploits machine virtualization to provide substantially stronger information security guarantees against information leakage attacks than that traditionally offered by physical (non-virtualized) computer systems. System administration-related advantages of machine virtualization are viewed as valuable security-related advantages that are exploited to reduce systems{u2019} exposure to security threats. This thesis presents four contributions. Firstly, a novel OS-independent information security approach called Virtualized Anti-Information Leakage (VAIL) to address information leakage attacks by malicious software and insiders, even after decryption of sensitive files using untrusted machines. The idea is based on combining machine virtualization with cryptography and system call monitoring to achieve the intended objective. Secondly, a novel approach called VAIL Disordered-Bitstring Provider (VDBP) to generate pseudo-random bitstrings. It is one of VAIL modules. It is essential to support VAIL{u2019}s cryptography-related operations, and salt user-supplied passwords. Thirdly, a novel approach called VAIL System Call Monitor (VSCM) to detect and thwart previously unknown code injection attacks. It is one of VAIL modules. It intercepts and verifies CreateProcess() system call invocations from a monitored process. In case an unknown executable is detected in the first parameter of a call, this indicates its maliciousness. In response, VSCM encrypts that parameter value to render the call invalid, thereby thwarting adversaries{u2019} attacks by preventing the OS from loading and executing the new malicious child process. Fourthly, a novel covert channel that is specific to virtual machine monitors (VMMs); it is called VMM memory reclamation-based covert storage channel |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE | |
Additional physical form available note | Issued also as CD |
653 #4 - INDEX TERM--UNCONTROLLED | |
Uncontrolled term | Countering information leakage |
653 #4 - INDEX TERM--UNCONTROLLED | |
Uncontrolled term | Operating systems (OSs) |
653 #4 - INDEX TERM--UNCONTROLLED | |
Uncontrolled term | Virtualization |
700 0# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Hesham Ahmed Hefny , |
Relator term | |
700 0# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Nermin Hamza Abdelghafar , |
Relator term | |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://172.23.153.220/th.pdf">http://172.23.153.220/th.pdf</a> |
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN) | |
Cataloger | Aml |
Reviser | Cataloger |
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN) | |
Cataloger | Nazla |
Reviser | Revisor |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Thesis |
Source of classification or shelving scheme | Not for loan | Home library | Current library | Date acquired | Full call number | Barcode | Date last seen | Koha item type | Copy number |
---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | المكتبة المركزبة الجديدة - جامعة القاهرة | قاعة الرسائل الجامعية - الدور الاول | 11.02.2024 | Cai01.18.02.Ph.D.2016.Om.N | 01010110069384000 | 22.09.2023 | Thesis | ||
Dewey Decimal Classification | المكتبة المركزبة الجديدة - جامعة القاهرة | مخـــزن الرســائل الجـــامعية - البدروم | 11.02.2024 | Cai01.18.02.Ph.D.2016.Om.N | 01020110069384000 | 22.09.2023 | CD - Rom | 69384.CD |