A Novel approach for countering information leakage based on virtualization / Omar Hussein Sayed Mohamed ; Supervised Hesham Ahmed Hefny , Nermin Hamza Abdelghafar
Material type:
- نهج جديد لمواجهة تسريب المعلومات اعتمادا على الافتراضية [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.Ph.D.2016.Om.N (Browse shelf(Opens below)) | Not for loan | 01010110069384000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.Ph.D.2016.Om.N (Browse shelf(Opens below)) | 69384.CD | Not for loan | 01020110069384000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.18.02.Ph.D.2016.Ho.S Sentiment analysis and opinion mining formodern standard Arabic and colloquial text / | Cai01.18.02.Ph.D.2016.Ma.C Computational intelligence approaches for bioinformatics problems / | Cai01.18.02.Ph.D.2016.Ma.C Computational intelligence approaches for bioinformatics problems / | Cai01.18.02.Ph.D.2016.Om.N A Novel approach for countering information leakage based on virtualization / | Cai01.18.02.Ph.D.2016.Om.N A Novel approach for countering information leakage based on virtualization / | Cai01.18.02.Ph.D.2017.Ab.W Web services clustering for improving services discovery and selection / | Cai01.18.02.Ph.D.2017.Ab.W Web services clustering for improving services discovery and selection / |
Thesis (Ph.D.) - Cairo University - Institute of Statistical Studies and Research- Department of Computer and Information Science
In traditional computer architecture, operating systems (OSs) are responsible for managing systems resources, handling processes requests to access the resources, and maintaining data privacy through process isolation. However, this architecture broadens the attack surface to include the whole software stack. This thesis exploits machine virtualization to provide substantially stronger information security guarantees against information leakage attacks than that traditionally offered by physical (non-virtualized) computer systems. System administration-related advantages of machine virtualization are viewed as valuable security-related advantages that are exploited to reduce systems{u2019} exposure to security threats. This thesis presents four contributions. Firstly, a novel OS-independent information security approach called Virtualized Anti-Information Leakage (VAIL) to address information leakage attacks by malicious software and insiders, even after decryption of sensitive files using untrusted machines. The idea is based on combining machine virtualization with cryptography and system call monitoring to achieve the intended objective. Secondly, a novel approach called VAIL Disordered-Bitstring Provider (VDBP) to generate pseudo-random bitstrings. It is one of VAIL modules. It is essential to support VAIL{u2019}s cryptography-related operations, and salt user-supplied passwords. Thirdly, a novel approach called VAIL System Call Monitor (VSCM) to detect and thwart previously unknown code injection attacks. It is one of VAIL modules. It intercepts and verifies CreateProcess() system call invocations from a monitored process. In case an unknown executable is detected in the first parameter of a call, this indicates its maliciousness. In response, VSCM encrypts that parameter value to render the call invalid, thereby thwarting adversaries{u2019} attacks by preventing the OS from loading and executing the new malicious child process. Fourthly, a novel covert channel that is specific to virtual machine monitors (VMMs); it is called VMM memory reclamation-based covert storage channel
Issued also as CD
There are no comments on this title.