Show simple item record

dc.contributor.authorResh, Amit
dc.date.accessioned2016-12-15T11:23:57Z
dc.date.available2016-12-15T11:23:57Z
dc.date.issued2016
dc.identifier.isbn978-951-39-6887-8
dc.identifier.otheroai:jykdok.linneanet.fi:1644526
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/52371
dc.description.abstractThe business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. Modern processors contain hardware virtualization capabilities that support implementation of hypervisors for the purpose of managing multiple Virtual-Machines (VMs) on a single computer platform. The facilities provided by hardware virtualization grant the hypervisor control of the hardware platform at an effective privilege level that supersedes the OS. The purpose of this work is to research and develop a methodology based on a thin-hypervisor that exploits the virtues of hardware virtualization for the purpose of protecting a computer system against malicious penetration. To successfully accomplish this, the thin-hypervisor must be guaranteed to be trusted, with respect to its instructions its configuration structures and its true control over the hardware platform. Moreover, it must be able to protect itself indefinitely from subversion. The methodology presented here describes the means to establish a trusted thin-hypervisor and demonstrates how it may be exercised to restrict code execution exclusively to pre-signed, whitelisted, software. This methodology provides resistance to most APT attack vectors, including those based on zero-day vulnerabilities that may slip under behavioral-pattern radars.
dc.format.extent1 verkkoaineisto (98 sivua, 77 sivua useina numerointijaksoina)
dc.language.isoeng
dc.publisherUniversity of Jyväskylä
dc.relation.ispartofseriesJyväskylä studies in computing
dc.subject.othervirtuaalikoneet
dc.subject.otherhypervisorit
dc.subject.othercyber protection
dc.subject.otherAPT prevention
dc.subject.otherhypervisor
dc.subject.otherthin-hypervisor
dc.subject.othervirtualization
dc.subject.otherattestation
dc.subject.othertrusted computing
dc.subject.otherwhitelisting
dc.titleEnforcing trust for execution-protection in modern environments
dc.identifier.urnURN:ISBN:978-951-39-6887-8
dc.type.dcmitypeTexten
dc.type.ontasotVäitöskirjafi
dc.type.ontasotDoctoral dissertationen
dc.contributor.tiedekuntaInformaatioteknologian tiedekuntafi
dc.contributor.yliopistoUniversity of Jyväskyläen
dc.contributor.yliopistoJyväskylän yliopistofi
dc.contributor.oppiaineTietotekniikkafi
dc.relation.issn1456-5390
dc.relation.numberinseries255
dc.rights.accesslevelopenAccessfi
dc.subject.ysotietoturva
dc.subject.ysopääsynvalvonta
dc.subject.ysovirtualisointi


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record