Hardware/software co-design for efficient security analysis효율적인 보안 분석을 위한 하드웨어/소프트웨어 통합 설계

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 379
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKang, Brent Byung Hoon-
dc.contributor.advisor강병훈-
dc.contributor.authorKim, Minsu-
dc.date.accessioned2019-08-25T02:48:18Z-
dc.date.available2019-08-25T02:48:18Z-
dc.date.issued2018-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=734429&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/265359-
dc.description학위논문(박사) - 한국과학기술원 : 정보보호대학원, 2018.2,[v, 69 p. :]-
dc.description.abstractThe reference monitor is one of the methodologies to enhance the security of a system. It defines a legitimate state of the system and determines anomaly by comparing runtime status with pre-defined legitimate status. One of the important factors to determine the performance and practicality of the monitor is the implementation method, which can be based on either software or hardware. Software-based approaches have the advantage that they can be easily applicable and deployable to the existing system without changing hardware components, but the monitoring code for checking the security of a protected system employes hardware resources (i.e., CPU and memory) occupied by the software running on the host, which causes performance degradation. Hardware-based approaches have a negligible performance overhead but they are not flexibly adopting new detection method, since any modification of an hardware would certainly incur significant costs and time. In this thesis, I will describe the hardware/software co-design for a practical security reference monitor that can be attached to an existing system without significant modification of a host processor. By splitting the monitoring into the information extraction and the security analysis, and offloading heavy security analysis to a dedicated off-core, the solutions can affect negligible performance overhead to the host system. Furthermore, the software components of the solutions provide not only the programmability and flexibility that security analysis schemes can be agilely applied but also the way the context information of the host processor is efficiently transferred to the off-core. Based on the above design, I implemented two security monitors based on the data flow and control flow analysis each of which can mitigate code-reuse attack and memory corruption vulnerabilities respectively.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectreference monitor▼acode-reuse attack defense▼adata information flow tracking▼ahardware/software▼aco-design-
dc.subject참조 모니터▼a코드 재사용 공격 방어▼a테이터 정보 흐름 추적▼a하드웨어/소프트웨어▼a통합 설계-
dc.titleHardware/software co-design for efficient security analysis-
dc.title.alternative효율적인 보안 분석을 위한 하드웨어/소프트웨어 통합 설계-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :정보보호대학원,-
dc.contributor.alternativeauthor김민수-
Appears in Collection
IS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0