DESERVE: a Framework for Detecting Program Security Vulnerability Exploitations

dc.contributor.authorMohosina, Amatulen
dc.contributor.departmentElectrical and Computer Engineeringen
dc.contributor.supervisorZulkernine, Mohammaden
dc.date2011-09-19 19:04:28.423
dc.date.accessioned2011-09-20T21:56:33Z
dc.date.available2011-09-20T21:56:33Z
dc.date.issued2011-09-20
dc.degree.grantorQueen's University at Kingstonen
dc.descriptionThesis (Master, Electrical & Computer Engineering) -- Queen's University, 2011-09-19 19:04:28.423en
dc.description.abstractIt is difficult to develop a program that is completely free from vulnerabilities. Despite the applications of many approaches to secure programs, vulnerability exploitations occur in real world in large numbers. Exploitations of vulnerabilities may corrupt memory spaces and program states, lead to denial of services and authorization bypassing, provide attackers the access to authorization information, and leak sensitive information. Monitoring at the program code level can be a way of vulnerability exploitation detection at runtime. In this work, we propose a monitor embedding framework DESERVE (a framework for DEtecting program SEcuRity Vulnerability Exploitations). DESERVE identifies exploitable statements from source code based on static backward slicing and embeds necessary code to detect attacks. During the deployment stage, the enhanced programs execute exploitable statements in a separate test environment. Unlike traditional monitors that extract and store program state information to compare with vulnerable free program states to detect exploitation, our approach does not need to save state information. Moreover, the slicing technique allows us to avoid the tracking of fine grained level of information about runtime program environments such as input flow and memory state. We implement DESERVE for detecting buffer overflow, SQL injection, and cross-site scripting attacks. We evaluate our approach for real world programs implemented in C and PHP languages. The results show that the approach can detect some of the well-known attacks. Moreover, the approach imposes negligible runtime overhead.en
dc.description.degreeM.A.Sc.en
dc.identifier.urihttp://hdl.handle.net/1974/6734
dc.language.isoengen
dc.relation.ispartofseriesCanadian thesesen
dc.subjectCross-Site Scriptingen
dc.subjectBuffer Overflowen
dc.subjectSoftware Engineeringen
dc.subjectVulnerability Monitoren
dc.subjectSoftware Securityen
dc.subjectRuntime Testingen
dc.subjectSQL Injectionen
dc.titleDESERVE: a Framework for Detecting Program Security Vulnerability Exploitationsen
dc.typethesisen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Mohosina_Amatul_201109_MASc.pdf
Size:
799.4 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.64 KB
Format:
Item-specific license agreed upon to submission
Description: