Threat Detection in Program Execution and Data Movement: Theory and Practice

dc.contributor.authorShu, Xiaokuien
dc.contributor.committeechairYao, Danfeng (Daphne)en
dc.contributor.committeememberJaeger, Trenten
dc.contributor.committeememberSchaumont, Patrick R.en
dc.contributor.committeememberRamakrishnan, Narenen
dc.contributor.committeememberRyder, Barbara G.en
dc.contributor.departmentComputer Scienceen
dc.date.accessioned2016-06-26T08:00:28Zen
dc.date.available2016-06-26T08:00:28Zen
dc.date.issued2016-06-25en
dc.description.abstractProgram attacks are one of the oldest and fundamental cyber threats. They compromise the confidentiality of data, the integrity of program logic, and the availability of services. This threat becomes even severer when followed by other malicious activities such as data exfiltration. The integration of primitive attacks constructs comprehensive attack vectors and forms advanced persistent threats. Along with the rapid development of defense mechanisms, program attacks and data leak threats survive and evolve. Stealthy program attacks can hide in long execution paths to avoid being detected. Sensitive data transformations weaken existing leak detection mechanisms. New adversaries, e.g., semi-honest service provider, emerge and form threats. This thesis presents theoretical analysis and practical detection mechanisms against stealthy program attacks and data leaks. The thesis presents a unified framework for understanding different branches of program anomaly detection and sheds light on possible future program anomaly detection directions. The thesis investigates modern stealthy program attacks hidden in long program executions and develops a program anomaly detection approach with data mining techniques to reveal the attacks. The thesis advances network-based data leak detection mechanisms by relaxing strong requirements in existing methods. The thesis presents practical solutions to outsource data leak detection procedures to semi-honest third parties and identify noisy or transformed data leaks in network traffic.en
dc.description.degreePh. D.en
dc.format.mediumETDen
dc.identifier.othervt_gsexam:7560en
dc.identifier.urihttp://hdl.handle.net/10919/71463en
dc.publisherVirginia Techen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectCybersecurityen
dc.subjectProgram Anomaly Detectionen
dc.subjectData Leak Detectionen
dc.titleThreat Detection in Program Execution and Data Movement: Theory and Practiceen
dc.typeDissertationen
thesis.degree.disciplineComputer Science and Applicationsen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.leveldoctoralen
thesis.degree.namePh. D.en

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Shu_X_D_2016.pdf
Size:
3.07 MB
Format:
Adobe Portable Document Format