dc.contributor.author | Resh, Amit | |
dc.date.accessioned | 2016-12-15T11:23:57Z | |
dc.date.available | 2016-12-15T11:23:57Z | |
dc.date.issued | 2016 | |
dc.identifier.isbn | 978-951-39-6887-8 | |
dc.identifier.other | oai:jykdok.linneanet.fi:1644526 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/52371 | |
dc.description.abstract | The business world is exhibiting a growing dependency on computer systems,
their operations and the databases they contain. Unfortunately, it also suffers
from an ever growing recurrence of malicious software attacks. Malicious attack
vectors are diverse and the computer-security industry is producing an
abundance of behavioral-pattern detections to combat the phenomenon.
Modern processors contain hardware virtualization capabilities that
support implementation of hypervisors for the purpose of managing multiple
Virtual-Machines (VMs) on a single computer platform. The facilities provided
by hardware virtualization grant the hypervisor control of the hardware
platform at an effective privilege level that supersedes the OS.
The purpose of this work is to research and develop a methodology based
on a thin-hypervisor that exploits the virtues of hardware virtualization for the
purpose of protecting a computer system against malicious penetration. To
successfully accomplish this, the thin-hypervisor must be guaranteed to be
trusted, with respect to its instructions its configuration structures and its true
control over the hardware platform. Moreover, it must be able to protect itself
indefinitely from subversion. The methodology presented here describes the
means to establish a trusted thin-hypervisor and demonstrates how it may be
exercised to restrict code execution exclusively to pre-signed, whitelisted,
software.
This methodology provides resistance to most APT attack vectors,
including those based on zero-day vulnerabilities that may slip under
behavioral-pattern radars. | |
dc.format.extent | 1 verkkoaineisto (98 sivua, 77 sivua useina numerointijaksoina) | |
dc.language.iso | eng | |
dc.publisher | University of Jyväskylä | |
dc.relation.ispartofseries | Jyväskylä studies in computing | |
dc.rights | In Copyright | |
dc.subject.other | virtuaalikoneet | |
dc.subject.other | hypervisorit | |
dc.subject.other | cyber protection | |
dc.subject.other | APT prevention | |
dc.subject.other | hypervisor | |
dc.subject.other | thin-hypervisor | |
dc.subject.other | virtualization | |
dc.subject.other | attestation | |
dc.subject.other | trusted computing | |
dc.subject.other | whitelisting | |
dc.title | Enforcing trust for execution-protection in modern environments | |
dc.type | doctoral thesis | |
dc.identifier.urn | URN:ISBN:978-951-39-6887-8 | |
dc.type.dcmitype | Text | en |
dc.type.ontasot | Väitöskirja | fi |
dc.type.ontasot | Doctoral dissertation | en |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.type.coar | http://purl.org/coar/resource_type/c_db06 | |
dc.relation.issn | 1456-5390 | |
dc.relation.numberinseries | 255 | |
dc.rights.accesslevel | openAccess | |
dc.type.publication | doctoralThesis | |
dc.subject.yso | tietoturva | |
dc.subject.yso | pääsynvalvonta | |
dc.subject.yso | virtualisointi | |
dc.rights.url | https://rightsstatements.org/page/InC/1.0/ | |