Mason Archival Repository Service

Protection from Within: Runtime Hardening Techniques for COTS Binaries

Show simple item record

dc.contributor.advisor Stavrou, Angelos Elsabagh, Mohamed
dc.creator Elsabagh, Mohamed 2018-10-22T01:21:19Z 2018-10-22T01:21:19Z 2017
dc.description.abstract Software systems are the backbone of modern life as they drive all computerized technologies. The ever-increasing size and complexity of today's systems makes them very challenging to properly design and test, resulting in an incomprehensible attack surface that leads to poor --- or altogether missing --- security countermeasures. Owing to implementation and testing deficiencies, security defenses are deployed at the network and host perimeters to increase cyber coverage against attacks. Unfortunately, the current poor state of systems security bespeaks that perimeter security is not effective, especially with the proliferation of mobile, cloud, and IoT services where the perimeter cannot be clearly defined.
dc.format.extent 169 pages
dc.language.iso en
dc.rights Copyright 2017 Mohamed Elsabagh
dc.subject Computer science en_US
dc.subject Code-Reuse Attacks en_US
dc.subject Denial-of-Service en_US
dc.subject Probabilistic Finite Automata en_US
dc.subject Return-Oriented Programming en_US
dc.subject Runtime Application Self-Protection en_US
dc.subject Static Binary Analysis en_US
dc.title Protection from Within: Runtime Hardening Techniques for COTS Binaries
dc.type Dissertation Ph.D. Computer Science George Mason University

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search MARS


My Account