Browsing School of Computing Graduate Theses by Author "Zulkernine, Mohammad"
Now showing items 1-20 of 24
-
Advancing Security Services for Cloud Applications
Elsayed, MarwaWith cloud computing taking roots, Software as a Service (SaaS) is transforming the future of Information Technology (IT). SaaS is a modern pervasive software delivery model in the Cloud in which software providers host ... -
Android App Protection through Anti-tampering and Anti-debugging Techniques
Wan, JiaAndroid devices remain an attractive mobile malware target in recent years. Android applications (or simply apps) in the device are vulnerable to different attacks which can tamper with the execution of an app to change app ... -
Browser Fingerprinting: Analysis, Detection, and Prevention at Runtime
Faiz Khademi, Amin (2014-11-04)Most Web users are unaware of being identified or followed by web agents which leverage techniques such as browser fingerprinting (or fingerprinting). Data obtained through such fingerprinting techniques can be utilized ... -
Classifying And Predicting Software Security Vulnerabilities based on Reproducibility
Davari, MaryamSecurity defects are common in large software systems because of their size and complexity. Although efficient development processes, testing, and maintenance policies are applied to software systems, there are still a ... -
Defending Against DDoS and Unauthorized Access Attacks in Information Centric Networking
AbdAllah, EslamInformation Centric Networking (ICN) is a new communication paradigm that focuses on content retrieval from the network regardless of the content storage location. ICN changes the security model from securing the path to ... -
A defense framework for flooding-based DDoS attacks
You, Yonghua (2007-08-29)Distributed denial of service (DDoS) attacks are widely regarded as a major threat to the Internet. A flooding-based DDoS attack is a very common way to attack a victim machine by sending a large number of malicious traffic. ... -
DNIDS: A dependable network intrusion detection system using the CSI-KNN algorithm
Kuang, Liwei (2007-09-14)The dependability of an Intrusion Detection System (IDS) relies on two factors: ability to detect intrusions and survivability in hostile environments. Machine learning-based anomaly detection approaches are gaining ... -
Embedding Security Monitors in Software Components
Khan, Muhammad (2014-09-05)Software can be made more secure by stipulating and integrating security specifications in the development process. However, guaranteeing the correct implementation of these specifications is a daunting task. In spite of ... -
A Hybrid Approach to Detect Tabnabbing Attacks
Fahim Hashemi, Hana Sadat (2014-08-29)Phishing is one of the most prevalent types of modern attacks, costing significant financial losses to enterprises and users each day. Despite the emergence of various anti-phishing tools and techniques, not only there has ... -
Lightweight Authenticated Encryption for Vehicle Controller Area Network
Hridoy, Syed Akib AnwarVehicle manufacturers are installing a large number of Electronic Control Units (ECU) inside vehicles. ECUs communicate among themselves via a Controller Area Network (CAN) to ensure better user experience and safety. CAN ... -
Mitigation of Web-Based Program Security Vulnerability Exploitations
Shahriar, Hossain (2011-11-30)Over the last few years, web-based attacks have caused significant harm to users. Many of these attacks occur through the exploitations of common security vulnerabilities in web-based programs. Given that, mitigation of ... -
Monitoring Components by Using Aspects and Contracts in Wrappers
Yang, Xiaofeng (2011-01-05)The re-usability and modularity of components reduce the cost and complexity of the software design. It is difficult to predict run-time scenarios covering all possible circumstances to ensure that the components are full ... -
Mutation-based testing of buffer overflows, SQL injections, and format string bugs
Shahriar, Hossain (2008-08-20)Testing is an indispensable mechanism for assuring software quality. One of the key issues in testing is to obtain a test data set that is able to effectively test an implementation. An adequate test data set consists of ... -
On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment
Godfrey, Michael (2013-09-26)As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifi cally, the paradigm promotes a risk of information leakage across virtual machine isolation via ... -
Orthogonal Security Defect Classification for Secure Software Development
Hunny, Umme (2012-10-31)Security defects or vulnerabilities are inescapable in software development. Thus, it is always better to address security issues during the software development phases, rather than developing patches after the security ... -
Preserving Accuracy and Privacy in Participatory Sensing Systems
Alswailim, MohannadParticipatory Sensing (PS) is an approach that offers individuals and interest groups the opportunity to contribute to an application using their handheld sensor devices such as smartphones and tablets. These sensor devices ... -
Protecting Browser Extensions from JavaScript Injection Attacks with Runtime Protection and Static Analysis
Barua, Anton (2012-10-01)With the rapid proliferation of the internet, web browsers have evolved from single-purpose remote document viewers into multifaceted systems for executing dynamic, interactive web applications. In order to enhance the web ... -
A Protocol-Specific Constraint-Based Intrusion Detection System
Hasan, MdWith the advancement of new technologies, the frequency of malicious attacks is also growing rapidly. Even networks without external connections cannot hide from these attacks. Constant monitoring of a network is vital for ... -
Securing Vehicle Electronic Control Unit (ECU) Communications and Stored Data
Alam, SwawibeNowadays, the automobile industry is integrating many new features into vehicles. To provide these features, various electronic systems are being added. These systems are coordinated by different ECUs (Electronic Control ... -
Securing Web Applications with Secure Coding Practices and Integrity Verification
Anis, Arafa MohdThe concept of security in web applications is not new. However, it is often ignored in the development stages of the web applications. Being multitiered and spread across different domains, it is challenging to come up ...