header
Local cover image
Local cover image
Image from OpenLibrary

Vulnerabilities detection in internet of things operating systems / Abdullah Mahmoud Abdullah Abdullah Alboghdady ; Supervised Khaled Wassif , Mohammad Elramly

By: Contributor(s): Material type: TextTextLanguage: English Publication details: Cairo : Abdullah Mahmoud Abdullah Abdullah Alboghdady , 2021Description: 105 P. : charts ; 30cmOther title:
  • كشف الثغرات فى نظم تشغيل إنترنت الأشياء [Added title page title]
Subject(s): Online resources: Available additional physical forms:
  • Issued also as CD
Dissertation note: Thesis (M.Sc.) - Cairo University - Faculty of Computers and Artificial Intelligence - Department of Computer Sciences Summary: The Internet of Things Operating Systems (IoT OSs) run, manage and control IoT devices. Therefore, it is essential to secure the source code for IoT OSs, especially if deployed on devices used for human care and safety. IoT devices can be high-end devices that are operated by traditional operating systems, such as Linux, or low-end devices with limited resources, e.g., very limited memory, computational power, and power supply. The scope of this study is low-end IoT OSs, which play a vital role in operating and running low-end devices. The main objective of this research is to create a supervised Machine Learning (ML) model for vulnerability detection of IoT OSs source code. First, we created a labeled dataset of IoT OS{u2019}s vulnerability regarding Common Weakness Enumeration (CWE) as a benchmark by exploiting Static Analysis Tools (SATs). We applied SATS to four IoT OSs to identify vulnerabilities and to investigate the growth of IoT OSs total errors, the growth of errors per 1 K SLOC, and identify the most prevalent vulnerabilities within the IoT OSs source code. Additionally, CodeScene tool was used to investigate the development of evolutionary properties of IoT OSs and address the relationship between the evolutionary properties and the presence of IoT OS vulnerabilities. As a result, we created a labeled dataset of vulnerable and benign code snippets and trained three ML models on detecting CWE vulnerabilities present in IoT OSs.Then, we chose the ML with the best training accuracy to be our detection model for IoT OSs vulnerabilities detection
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Call number Copy number Status Barcode
Thesis Thesis قاعة الرسائل الجامعية - الدور الاول المكتبة المركزبة الجديدة - جامعة القاهرة Cai01.20.03.M.Sc.2021.Ab.V (Browse shelf(Opens below)) Not for loan 01010110085407000
CD - Rom CD - Rom مخـــزن الرســائل الجـــامعية - البدروم المكتبة المركزبة الجديدة - جامعة القاهرة Cai01.20.03.M.Sc.2021.Ab.V (Browse shelf(Opens below)) 85407.CD Not for loan 01020110085407000

Thesis (M.Sc.) - Cairo University - Faculty of Computers and Artificial Intelligence - Department of Computer Sciences

The Internet of Things Operating Systems (IoT OSs) run, manage and control IoT devices. Therefore, it is essential to secure the source code for IoT OSs, especially if deployed on devices used for human care and safety. IoT devices can be high-end devices that are operated by traditional operating systems, such as Linux, or low-end devices with limited resources, e.g., very limited memory, computational power, and power supply. The scope of this study is low-end IoT OSs, which play a vital role in operating and running low-end devices. The main objective of this research is to create a supervised Machine Learning (ML) model for vulnerability detection of IoT OSs source code. First, we created a labeled dataset of IoT OS{u2019}s vulnerability regarding Common Weakness Enumeration (CWE) as a benchmark by exploiting Static Analysis Tools (SATs). We applied SATS to four IoT OSs to identify vulnerabilities and to investigate the growth of IoT OSs total errors, the growth of errors per 1 K SLOC, and identify the most prevalent vulnerabilities within the IoT OSs source code. Additionally, CodeScene tool was used to investigate the development of evolutionary properties of IoT OSs and address the relationship between the evolutionary properties and the presence of IoT OS vulnerabilities. As a result, we created a labeled dataset of vulnerable and benign code snippets and trained three ML models on detecting CWE vulnerabilities present in IoT OSs.Then, we chose the ML with the best training accuracy to be our detection model for IoT OSs vulnerabilities detection

Issued also as CD

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
Share
Under the supervision of New Central Library Manager

Implemented and Customized by: Eng.M.Mohamady
Contact:   info@cl.cu.edu.eg

© All rights reserved  New Central Library