Javascript must be enabled to continue!
Maintaining Web Applications Integrity Running on RADIUM
View through CrossRef
Computer security attacks take place due to the presence of vulnerabilities and bugs in software applications. Bugs and vulnerabilities are the result of weak software architecture and lack of standard software development practices. Despite the fact that software companies are investing millions of dollars in the research and development of software designs security risks are still at large. In some cases software applications are found to carry vulnerabilities for many years before being identified. A recent such example is the popular Heart Bleed Bug in the Open SSL/TSL. In today’s world, where new software application are continuously being developed for a varied community of users; it’s highly unlikely to have software applications running without flaws. Attackers on computer system securities exploit these vulnerabilities and bugs and cause threat to privacy without leaving any trace. The most critical vulnerabilities are those which are related to the integrity of the software applications. Because integrity is directly linked to the credibility of software application and data it contains. Here I am giving solution of maintaining web applications integrity running on RADIUM by using daikon. Daikon generates invariants, these invariants are used to maintain the integrity of the web application and also check the correct behavior of web application at run time on RADIUM architecture in case of any attack or malware. I used data invariants and program flow invariants in my solution to maintain the integrity of web-application against such attack or malware. I check the behavior of my proposed invariants at run-time using Lib-VMI/Volatility memory introspection tool. This is a novel approach and proof of concept toward maintaining web application integrity on RADIUM.
Title: Maintaining Web Applications Integrity Running on RADIUM
Description:
Computer security attacks take place due to the presence of vulnerabilities and bugs in software applications.
Bugs and vulnerabilities are the result of weak software architecture and lack of standard software development practices.
Despite the fact that software companies are investing millions of dollars in the research and development of software designs security risks are still at large.
In some cases software applications are found to carry vulnerabilities for many years before being identified.
A recent such example is the popular Heart Bleed Bug in the Open SSL/TSL.
In today’s world, where new software application are continuously being developed for a varied community of users; it’s highly unlikely to have software applications running without flaws.
Attackers on computer system securities exploit these vulnerabilities and bugs and cause threat to privacy without leaving any trace.
The most critical vulnerabilities are those which are related to the integrity of the software applications.
Because integrity is directly linked to the credibility of software application and data it contains.
Here I am giving solution of maintaining web applications integrity running on RADIUM by using daikon.
Daikon generates invariants, these invariants are used to maintain the integrity of the web application and also check the correct behavior of web application at run time on RADIUM architecture in case of any attack or malware.
I used data invariants and program flow invariants in my solution to maintain the integrity of web-application against such attack or malware.
I check the behavior of my proposed invariants at run-time using Lib-VMI/Volatility memory introspection tool.
This is a novel approach and proof of concept toward maintaining web application integrity on RADIUM.
Related Results
Re-treatment of metastatic castration-resistant prostate cancer patients with radium-223 therapy in daily practice.
Re-treatment of metastatic castration-resistant prostate cancer patients with radium-223 therapy in daily practice.
183
Background:
Radium-223 is a therapeutic option for metastatic castration-resistant prostate cancer (mCRPC) patients with symptomat...
Developing guidelines for research institutions
Developing guidelines for research institutions
As introduced in Chapter 1, in this thesis, I developed guidelines to research institutions on how to foster research integrity. I did this by exploring how research institutions c...
Integrity Verification of Applications on RADIUM Architecture
Integrity Verification of Applications on RADIUM Architecture
Trusted Computing capability has become ubiquitous these days, and it is being widely deployed into consumer devices as well as enterprise platforms. As the number of threats is in...
Actualització consistent de bases de dades deductives
Actualització consistent de bases de dades deductives
En aquesta tesi, proposem un nou mètode per a l'actualització consistent de bases de dades deductives. Donada una petició d'actualització, aquest mètode tradueix de forma automàtic...
Monitoring and treatment of combined radium in Iowa private wells
Monitoring and treatment of combined radium in Iowa private wells
Unregulated private drinking water supplies, especially private wells, are likely to be disproportionately impacted by naturally-occurring radioactive material (NORM), which contam...
The Period of Decay of Radium B and Radium C
The Period of Decay of Radium B and Radium C
Measurements of the saturation currents produced between two parallel plates by a source of radium C of carefully tested purity have been performed by an accurate galvanometer meth...
Exploring running-style modulation
Exploring running-style modulation
Technological advances in the past decades allow runners to measure a large range of variables by means of wearables and smartphone applications. However, the interpretation of suc...
Radium: Secure Policy Engine in Hypervisor
Radium: Secure Policy Engine in Hypervisor
The basis of today’s security systems is the trust and confidence that the system will behave as expected and are in a known good trusted state. The trust is built from hardware an...


