• Login
    View Item 
    •   eScholar Home
    • Faculty of Engineering & Applied Science
    • Master Theses & Projects
    • View Item
    •   eScholar Home
    • Faculty of Engineering & Applied Science
    • Master Theses & Projects
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A monitoring framework for side-channel information leaks

    Thumbnail
    View/Open
    Lescisin_Michael_John.pdf (1.121Mb)
    Date
    2019-04-01
    Author
    Lescisin, Michael John
    Metadata
    Show full item record
    Abstract
    Security and privacy in computer systems is becoming an ever important field of study as the information available on these systems is of ever increasing value. The state of research on direct security attacks to computer systems, such as exploiting memory safety errors or exploiting unfiltered inputs to shells is at an advanced state and a rich set of security testing tools are available for testing software against these common types of attacks. Machine-learning based intrusion detection systems which monitor system activity for suspicious patterns are also available and are commonly deployed in production environments. What is missing, however, is the consideration of implicit information flows, or side-channels. One significant factor which has been holding back development on side-channel detection and mitigation is the very broad scope of the topic. Research in this topic has revealed side-channels formed by observable signals such as acoustic noise from a CPU, encrypted network traffic patterns, and ambient monitor light. Furthermore, there currently exists no portable method for distributing test cases for side-channels - as does for other security tests such as recon-ng for network footprinting. This thesis introduces a framework based on interoperable components for the purpose of modelling an adversary and generating feedback on what the adversary is capable of learning through the monitoring of a myriad of adversary-observable side-channel information sources. The framework operates by monitoring two data streams; the first being the stream of adversary-observable side-channel cues, and the second being the stream of private system activity. These data streams are ultimately used for the training and evaluation of a selected machine learning classifier to determine its performance of private system activity prediction. A prototype has been built to evaluate the effects of side-channel information leaks on five common computer system use cases.
    URI
    https://hdl.handle.net/10155/1019
    Collections
    • Electronic Theses and Dissertations [1369]
    • Master Theses & Projects [427]

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of eScholarCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV