On the Use of Fault Injection to Discover Security Vulnerabilities in Applications
dc.contributor.advisor | Cukier, Michel | en_US |
dc.contributor.author | Sivaramakrishnan, Hariharan | en_US |
dc.contributor.department | Electrical Engineering | en_US |
dc.contributor.publisher | Digital Repository at the University of Maryland | en_US |
dc.contributor.publisher | University of Maryland (College Park, Md.) | en_US |
dc.date.accessioned | 2006-06-14T06:02:22Z | |
dc.date.available | 2006-06-14T06:02:22Z | |
dc.date.issued | 2006-05-04 | en_US |
dc.description.abstract | The advent of the Internet has enabled developers to write and share software components with each other more easily. Developers have become increasingly reliant on code other than their own for application development; code that is often not well tested, and lacking any kind of security review, thus exposing its consumers to security vulnerabilities. The goal of this thesis is to adapt existing techniques, and discover new approaches that can be used to discover security vulnerabilities in applications. We use fault injection in each of our techniques and define a set of criteria to evaluate these approaches. The hierarchy of approaches, starting from a black box and ending in a full white box approach, allows a security reviewer to choose a technique depending on the amount of information available about the application under review, time constraints, and extent of security analysis and confidence desired in the program. | en_US |
dc.format.extent | 559322 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/1903/3566 | |
dc.language.iso | en_US | |
dc.subject.pqcontrolled | Engineering, Electronics and Electrical | en_US |
dc.subject.pqcontrolled | Computer Science | en_US |
dc.subject.pquncontrolled | fault injection | en_US |
dc.subject.pquncontrolled | vulnerabilities | en_US |
dc.subject.pquncontrolled | environmental approach | en_US |
dc.title | On the Use of Fault Injection to Discover Security Vulnerabilities in Applications | en_US |
dc.type | Thesis | en_US |
Files
Original bundle
1 - 1 of 1