header

A Novel approach for countering information leakage based on virtualization / (Record no. 57083)

MARC details
000 -LEADER
fixed length control field 03439cam a2200337 a 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-GiCUC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250223031527.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160703s2016 ua f m 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EG-GiCUC
Language of cataloging eng
Transcribing agency EG-GiCUC
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title eng
049 ## - LOCAL HOLDINGS (OCLC)
Holding library Deposite
097 ## - Thesis Degree
Thesis Level Ph.D
099 ## - LOCAL FREE-TEXT CALL NUMBER (OCLC)
Classification number Cai01.18.02.Ph.D.2016.Om.N
100 0# - MAIN ENTRY--PERSONAL NAME
Personal name Omar Hussein Sayed Mohamed
245 12 - TITLE STATEMENT
Title A Novel approach for countering information leakage based on virtualization /
Statement of responsibility, etc. Omar Hussein Sayed Mohamed ; Supervised Hesham Ahmed Hefny , Nermin Hamza Abdelghafar
246 15 - VARYING FORM OF TITLE
Title proper/short title نهج جديد لمواجهة تسريب المعلومات اعتمادا على الافتراضية
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cairo :
Name of publisher, distributor, etc. Omar Hussein Sayed Mohamed ,
Date of publication, distribution, etc. 2016
300 ## - PHYSICAL DESCRIPTION
Extent 175 Leaves ;
Dimensions 30cm
502 ## - DISSERTATION NOTE
Dissertation note Thesis (Ph.D.) - Cairo University - Institute of Statistical Studies and Research- Department of Computer and Information Science
520 ## - SUMMARY, ETC.
Summary, etc. In traditional computer architecture, operating systems (OSs) are responsible for managing systems resources, handling processes requests to access the resources, and maintaining data privacy through process isolation. However, this architecture broadens the attack surface to include the whole software stack. This thesis exploits machine virtualization to provide substantially stronger information security guarantees against information leakage attacks than that traditionally offered by physical (non-virtualized) computer systems. System administration-related advantages of machine virtualization are viewed as valuable security-related advantages that are exploited to reduce systems{u2019} exposure to security threats. This thesis presents four contributions. Firstly, a novel OS-independent information security approach called Virtualized Anti-Information Leakage (VAIL) to address information leakage attacks by malicious software and insiders, even after decryption of sensitive files using untrusted machines. The idea is based on combining machine virtualization with cryptography and system call monitoring to achieve the intended objective. Secondly, a novel approach called VAIL Disordered-Bitstring Provider (VDBP) to generate pseudo-random bitstrings. It is one of VAIL modules. It is essential to support VAIL{u2019}s cryptography-related operations, and salt user-supplied passwords. Thirdly, a novel approach called VAIL System Call Monitor (VSCM) to detect and thwart previously unknown code injection attacks. It is one of VAIL modules. It intercepts and verifies CreateProcess() system call invocations from a monitored process. In case an unknown executable is detected in the first parameter of a call, this indicates its maliciousness. In response, VSCM encrypts that parameter value to render the call invalid, thereby thwarting adversaries{u2019} attacks by preventing the OS from loading and executing the new malicious child process. Fourthly, a novel covert channel that is specific to virtual machine monitors (VMMs); it is called VMM memory reclamation-based covert storage channel
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Issued also as CD
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Countering information leakage
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Operating systems (OSs)
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Virtualization
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Hesham Ahmed Hefny ,
Relator term
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Nermin Hamza Abdelghafar ,
Relator term
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://172.23.153.220/th.pdf">http://172.23.153.220/th.pdf</a>
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN)
Cataloger Aml
Reviser Cataloger
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN)
Cataloger Nazla
Reviser Revisor
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Thesis
Holdings
Source of classification or shelving scheme Not for loan Home library Current library Date acquired Full call number Barcode Date last seen Koha item type Copy number
Dewey Decimal Classification   المكتبة المركزبة الجديدة - جامعة القاهرة قاعة الرسائل الجامعية - الدور الاول 11.02.2024 Cai01.18.02.Ph.D.2016.Om.N 01010110069384000 22.09.2023 Thesis  
Dewey Decimal Classification   المكتبة المركزبة الجديدة - جامعة القاهرة مخـــزن الرســائل الجـــامعية - البدروم 11.02.2024 Cai01.18.02.Ph.D.2016.Om.N 01020110069384000 22.09.2023 CD - Rom 69384.CD