已收录 273496 条政策
 政策提纲
  • 暂无提纲
Malware tolerance: Distributing trust over multiple devices
[摘要] Current security solutions try to keep the adversary out of the computer infrastructure. However, with zero-day exploits and certain rootkit attacks, the assumption that attacks can be blocked does not hold any more. This work presents the concept of malware tolerance accepting that every device might be compromised at some point in time. The concept aims to distribute trust over several devices so that no single device is able to compromise security features by itself. I create three malware-tolerant techniques to demonstrate the feasibility of the concept. This thesis introduces a trusted input system which delivers keystrokes securely from the keyboard to a recipient even if one of its components is compromised. The second approach is the design of a self-healing Industrial Control System, a sensor-actuator network to securely control a physical system. If an adversary manages to compromise one of the components, it remains secure and can even recover from attacks. Lastly, this thesis proposes a mesh network architecture aimed at smart-home networks without assuming any device in the network invulnerable to attacks applying isolation mechanisms to otherwise flat mesh networks. This thesis gives formal security proofs with protocol verifier ProVerif. The proof scripts are open-source.
[发布日期]  [发布机构] University:University of Birmingham;Department:School of Computer Science
[效力级别]  [学科分类] 
[关键词] Q Science;QA Mathematics;QA75 Electronic computers. Computer science [时效性] 
   浏览次数:4      统一登录查看全文      激活码登录查看全文