Please use this identifier to cite or link to this item: http://scholarbank.nus.edu.sg/handle/10635/121125
Title: DETECTION AND PREVENTION OF MISUSE OF SOFTWARE COMPONENTS
Authors: DAI TING
Keywords: system security, binary component, mobile platform, software component , component misuse, dynamic analysis
Issue Date: 22-Jan-2015
Citation: DAI TING (2015-01-22). DETECTION AND PREVENTION OF MISUSE OF SOFTWARE COMPONENTS. ScholarBank@NUS Repository.
Abstract: Software components are building blocks of modern computer systems. Modern computer systems are complex integrations of software components that encapsulate many sets of software functionalities. Moreover, these functionalities are affected by both the interactions of software components and various system settings. As a result, software components can behave in an unexpected way, deviating from the original functionality provided by the software components. We call such a vulnerability, a component misuse vulnerability. In this thesis, we propose systematic solutions to detect and prevent the component misuse vulnerability. First, binary loading behaviors in software programs can be misused via manipulating various system settings. We develop an approach to detect such binary loading vulnerabilities. It explains binary loading behaviors by listing various system settings, binaries and files that can affect the loading behaviors. It detects the unexpected uses of binary loading by identifying the factors that can be controlled by the attackers. Second, the APIs in ActiveX controls can be misused via component interactions. We develop a mechanism to detect ActiveX API-misuse vulnerabilities in Internet Explorer (IE), by detecting unexpected uses of APIs in the component interactions. It also blocks the APIs that can be misused in a fine-grained manner. The problem of component misuse also manifests itself in other systems. We propose a solution to mitigate the damage caused by component misuse vulnerability due to the interactions of software components in the Android platform. In particular, we develop a prevention mechanism of privilege escalation in Android inter-component communication (ICC). It prevents permission re-delegation in Android ICC which can cause the sender application (app) to gain additional privileges from the recipient app.
URI: http://scholarbank.nus.edu.sg/handle/10635/121125
Appears in Collections:Ph.D Theses (Open)

Show full item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
DaiT.pdf2.83 MBAdobe PDF

OPEN

NoneView/Download

Page view(s)

97
checked on Oct 26, 2018

Download(s)

120
checked on Oct 26, 2018

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.