首页> 外文学位 >Mobile code integrity through static program analysis, steganography, and dynamic transformation control.
【24h】

Mobile code integrity through static program analysis, steganography, and dynamic transformation control.

机译:通过静态程序分析,隐写术和动态转换控制实现移动代码的完整性。

获取原文
获取原文并翻译 | 示例

摘要

Mobile software provides a highly desirable and flexible form of computing, but creates complex security considerations beyond those associated with the traditional mode of computing. Execution environments with the ability to modify a program at run time compound the risks associated with mobile software. These dynamic program transformation environments could be used to introduce malicious code by transforming an otherwise safe program in a nefarious manner. Inadequate security can have profound, detrimental effects for both the producer and the consumer of mobile code.;Validating the integrity of software is one important criterion for safe execution on the client machine. However, networked devices with severely constrained bandwidth or power resources could handle delivery and management of integrity data much more efficiently than methods currently in use today. Techniques to control how a program evolves in a dynamic transformation environment, based on formal security policy, are also lacking. Prior to this research, techniques to control program transformation based on security policy did not exist.;This research presents a general tamper detection framework along with the design and implementation of two systems to validate program integrity for various forms of mobile computer programs. The tamper detection framework utilizes hybrid steganographic-cryptographic techniques to encode program authentication data by embedding a fragile watermark within a program. Using steganographic techniques to communicate this authentication data greatly simplifies the storage and management of the data. The fragile watermark can be used to authenticate the sender and to validate the integrity of a mobile program.;This dissertation is the first to provide techniques to control dynamic program transformations based upon specified security policy. The developed program transformation control framework is based on a control language which describes transformation policy to the runtime environment. The transformation controls will enable only those program transformations to be applied to the software that are acceptable to the specified policy, thereby controlling how the program is modified at runtime.;The major contributions of this dissertation are (1) identifying key weaknesses in current tamper detection techniques, (2) presenting the development and evaluation of novel techniques and frameworks that utilize static analysis of mobile code to embed and validate a tamper detection mark within mobile code, (3) identifying key weaknesses in current validation techniques for dynamically transforming program files, and (4) presenting the development and evaluation of novel techniques and frameworks that utilize a language developed to specify controls for dynamic program transformations to mobile code. The tamper detection component enables the insertion, extraction, and validation of a tamper detection mark in mobile code while maintaining semantic equivalence to the original code. The transformation controls enable dynamic program transformation to occur on a running program within a user-specified set of permissible transformations. The combined effect of tamper detection marking and transformation control helps provide for the safe dissemination and execution of mobile code through validation of program integrity.
机译:移动软件提供了一种非常理想且灵活的计算形式,但是却产生了与传统计算模式相关联的复杂安全注意事项。能够在运行时修改程序的执行环境使与移动软件相关的风险更加复杂。这些动态程序转换环境可用于通过恶意方式转换原本安全的程序来引入恶意代码。安全性不足会对移动代码的生产者和使用者都产生深远的有害影响。验证软件的完整性是在客户端计算机上安全执行的重要标准之一。但是,与当今当前使用的方法相比,具有严重受限的带宽或电源资源的联网设备可以更有效地处理完整性数据的传递和管理。也缺乏基于正式安全策略控制程序在动态转换环境中如何发展的技术。在此研究之前,尚不存在基于安全策略控制程序转换的技术。该研究提出了一个通用的篡改检测框架,以及两个系统的设计和实现,以验证各种形式的移动计算机程序的程序完整性。篡改检测框架利用混合隐写密码技术通过将易碎的水印嵌入程序来对程序身份验证数据进行编码。使用隐写技术来传递此身份验证数据将极大地简化数据的存储和管理。脆弱的水印可用于验证发送者并验证移动程序的完整性。本论文是第一个提供基于指定安全策略控制动态程序转换的技术的论文。开发的程序转换控制框架基于控制语言,该控制语言描述了到运行时环境的转换策略。转换控件将仅允许将那些程序转换应用于指定策略可接受的软件,从而控制在运行时如何修改程序。本论文的主要贡献是(1)识别当前篡改的关键弱点检测技术;(2)介绍利用移动代码的静态分析在移动代码中嵌入和验证篡改检测标记的新颖技术和框架的开发和评估,(3)识别当前验证技术中用于动态转换程序文件的关键弱点(4)介绍开发和评估新技术和框架,这些技术和框架利用开发的语言来指定用于将动态程序转换为移动代码的控件。篡改检测组件可以在移动代码中插入,提取和验证篡改检测标记,同时保持与原始代码的语义等效。转换控件使动态程序转换可以在用户指定的允许转换集中的运行程序上进行。篡改检测标记和转换控制的结合效果有助于通过验证程序完整性来安全地传播和执行移动代码。

著录项

  • 作者

    Jochen, Michael J.;

  • 作者单位

    University of Delaware.;

  • 授予单位 University of Delaware.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2008
  • 页码 235 p.
  • 总页数 235
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

  • 入库时间 2022-08-17 11:39:04

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号