Dissertation > Excellent graduate degree dissertation topics show

Design and Implementation of Taint Detection Based on Dynamic Binary Translation

Author: BaiZhiWen
Tutor: LiuXiYang
School: Xi'an University of Electronic Science and Technology
Course: Computer Software and Theory
Keywords: Virtual Machine Information flow Tainted data Access Control
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 122
Quote: 0
Read: Download Dissertation


Modern operating systems and software become increasingly large and complex software vulnerabilities and other defects followed . The attacker will often exploit these flaws to unauthorized access . A fast and reliable mechanism to detect these attacks , generate immune protection measures , protection of networks and systems . Infection and leakage of the information in the computer system it is mostly caused due to the insecure network access . Based on the particularity of network security , network access in data security , the use of the state of the virtual machine control features , logging and state control of malicious access and virus attacks . By modifying the open source QEMU virtual machine , the design and implementation of an information flow security detection tools DTAD . To capture network data by executing applications to determine whether access legitimate (target jump address of the function , the instruction access use ) . Once the attack is detected , the tool will implement a process level and kernel -level virtual machine state logging . Issue of malicious code , the tool will run the program inside the process space implantation diagnosis code to replace the malicious code , so you can collect the process information to be attacked . Collect network data recorded in the log and the virtual machine to process information than the associated tool able to generate accurate network intrusion detection signatures , the entire process is performed automatically . Release, good positioning attack types and provide effective protection measures through fast and effective signature . Experimental verification efficient tools attack recognition and information protection , identification and tracking and processing the detection protection system for infection data is effective .

Related Dissertations

  1. Study on Channel Allocation of Multi-Channel MAC Protocol in Ad-Hoc Network,TN929.5
  2. The Design and Implementation of DICOM Middle Software and Access Control Model in Formation Integration Platform,TP311.13
  3. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  4. Study on the Access Control of the Court Information System,TP309
  5. The Design and Implementation of Higher People’s Court Website That Based on Component and ASP Technology,TP311.52
  6. Based on the research of the industry value chain T with suppliers win-win mechanism,F224.32
  7. Design and implementation of civil explosive industry online procurement system,TP311.52
  8. The Research of Radar Equipment Networked Training and Inspection System Base on Digital Virtual Machine,TN957
  9. Research and Design of Virtual Research Center System of Yalong River Based on S2SH,TP311.52
  10. Fujian Telecom operation and maintenance operations audit system design and implementation,TP311.52
  11. Research on Purpose-based Access Control in Relational Database,TP311.13
  12. Research on Checking and Digesting Policy Conflicts Under Multi-Policy Environments,TP393.08
  13. Research and Implementation of Embeded Web System Security,TP393.08
  14. Design and Implementation of Network Access Control System Based on Portal Protocol,TP393.08
  15. The Research and Realization of Unwanted Code Monitoring System Based on Heuristic Algorithm,TP393.08
  16. The Optimization Research of Java Card Performance,TN409
  17. The Research and Implement of Information-Flow Monitoring Mechanism Base on the Security of Embedded System,TP309
  18. Design and Implementation of Information Flow Tracking,TP368.1
  19. Design and Realization of Distributed RFID Access Control System,TP273.5
  20. Research and Implementation on Smartcard Database Management System,TP311.52
  21. Design and Implement of Frequency EOC System and Research of Its Security Mechanism,TN915.02

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile