434 research outputs found

    Security and trust in cloud computing and IoT through applying obfuscation, diversification, and trusted computing technologies

    Get PDF
    Cloud computing and Internet of Things (IoT) are very widely spread and commonly used technologies nowadays. The advanced services offered by cloud computing have made it a highly demanded technology. Enterprises and businesses are more and more relying on the cloud to deliver services to their customers. The prevalent use of cloud means that more data is stored outside the organization’s premises, which raises concerns about the security and privacy of the stored and processed data. This highlights the significance of effective security practices to secure the cloud infrastructure. The number of IoT devices is growing rapidly and the technology is being employed in a wide range of sectors including smart healthcare, industry automation, and smart environments. These devices collect and exchange a great deal of information, some of which may contain critical and personal data of the users of the device. Hence, it is highly significant to protect the collected and shared data over the network; notwithstanding, the studies signify that attacks on these devices are increasing, while a high percentage of IoT devices lack proper security measures to protect the devices, the data, and the privacy of the users. In this dissertation, we study the security of cloud computing and IoT and propose software-based security approaches supported by the hardware-based technologies to provide robust measures for enhancing the security of these environments. To achieve this goal, we use obfuscation and diversification as the potential software security techniques. Code obfuscation protects the software from malicious reverse engineering and diversification mitigates the risk of large-scale exploits. We study trusted computing and Trusted Execution Environments (TEE) as the hardware-based security solutions. Trusted Platform Module (TPM) provides security and trust through a hardware root of trust, and assures the integrity of a platform. We also study Intel SGX which is a TEE solution that guarantees the integrity and confidentiality of the code and data loaded onto its protected container, enclave. More precisely, through obfuscation and diversification of the operating systems and APIs of the IoT devices, we secure them at the application level, and by obfuscation and diversification of the communication protocols, we protect the communication of data between them at the network level. For securing the cloud computing, we employ obfuscation and diversification techniques for securing the cloud computing software at the client-side. For an enhanced level of security, we employ hardware-based security solutions, TPM and SGX. These solutions, in addition to security, ensure layered trust in various layers from hardware to the application. As the result of this PhD research, this dissertation addresses a number of security risks targeting IoT and cloud computing through the delivered publications and presents a brief outlook on the future research directions.Pilvilaskenta ja esineiden internet ovat nykyään hyvin tavallisia ja laajasti sovellettuja tekniikkoja. Pilvilaskennan pitkälle kehittyneet palvelut ovat tehneet siitä hyvin kysytyn teknologian. Yritykset enenevässä määrin nojaavat pilviteknologiaan toteuttaessaan palveluita asiakkailleen. Vallitsevassa pilviteknologian soveltamistilanteessa yritykset ulkoistavat tietojensa käsittelyä yrityksen ulkopuolelle, minkä voidaan nähdä nostavan esiin huolia taltioitavan ja käsiteltävän tiedon turvallisuudesta ja yksityisyydestä. Tämä korostaa tehokkaiden turvallisuusratkaisujen merkitystä osana pilvi-infrastruktuurin turvaamista. Esineiden internet -laitteiden lukumäärä on nopeasti kasvanut. Teknologiana sitä sovelletaan laajasti monilla sektoreilla, kuten älykkäässä terveydenhuollossa, teollisuusautomaatiossa ja älytiloissa. Sellaiset laitteet keräävät ja välittävät suuria määriä informaatiota, joka voi sisältää laitteiden käyttäjien kannalta kriittistä ja yksityistä tietoa. Tästä syystä johtuen on erittäin merkityksellistä suojata verkon yli kerättävää ja jaettavaa tietoa. Monet tutkimukset osoittavat esineiden internet -laitteisiin kohdistuvien tietoturvahyökkäysten määrän olevan nousussa, ja samaan aikaan suuri osuus näistä laitteista ei omaa kunnollisia teknisiä ominaisuuksia itse laitteiden tai niiden käyttäjien yksityisen tiedon suojaamiseksi. Tässä väitöskirjassa tutkitaan pilvilaskennan sekä esineiden internetin tietoturvaa ja esitetään ohjelmistopohjaisia tietoturvalähestymistapoja turvautumalla osittain laitteistopohjaisiin teknologioihin. Esitetyt lähestymistavat tarjoavat vankkoja keinoja tietoturvallisuuden kohentamiseksi näissä konteksteissa. Tämän saavuttamiseksi työssä sovelletaan obfuskaatiota ja diversifiointia potentiaalisiana ohjelmistopohjaisina tietoturvatekniikkoina. Suoritettavan koodin obfuskointi suojaa pahantahtoiselta ohjelmiston takaisinmallinnukselta ja diversifiointi torjuu tietoturva-aukkojen laaja-alaisen hyödyntämisen riskiä. Väitöskirjatyössä tutkitaan luotettua laskentaa ja luotettavan laskennan suoritusalustoja laitteistopohjaisina tietoturvaratkaisuina. TPM (Trusted Platform Module) tarjoaa turvallisuutta ja luottamuksellisuutta rakentuen laitteistopohjaiseen luottamukseen. Pyrkimyksenä on taata suoritusalustan eheys. Työssä tutkitaan myös Intel SGX:ää yhtenä luotettavan suorituksen suoritusalustana, joka takaa suoritettavan koodin ja datan eheyden sekä luottamuksellisuuden pohjautuen suojatun säiliön, saarekkeen, tekniseen toteutukseen. Tarkemmin ilmaistuna työssä turvataan käyttöjärjestelmä- ja sovellusrajapintatasojen obfuskaation ja diversifioinnin kautta esineiden internet -laitteiden ohjelmistokerrosta. Soveltamalla samoja tekniikoita protokollakerrokseen, työssä suojataan laitteiden välistä tiedonvaihtoa verkkotasolla. Pilvilaskennan turvaamiseksi työssä sovelletaan obfuskaatio ja diversifiointitekniikoita asiakaspuolen ohjelmistoratkaisuihin. Vankemman tietoturvallisuuden saavuttamiseksi työssä hyödynnetään laitteistopohjaisia TPM- ja SGX-ratkaisuja. Tietoturvallisuuden lisäksi nämä ratkaisut tarjoavat monikerroksisen luottamuksen rakentuen laitteistotasolta ohjelmistokerrokseen asti. Tämän väitöskirjatutkimustyön tuloksena, osajulkaisuiden kautta, vastataan moniin esineiden internet -laitteisiin ja pilvilaskentaan kohdistuviin tietoturvauhkiin. Työssä esitetään myös näkemyksiä jatkotutkimusaiheista

    Understanding emerging client-Side web vulnerabilities using dynamic program analysis

    Get PDF
    Today's Web heavily relies on JavaScript as it is the main driving force behind the plethora of Web applications that we enjoy daily. The complexity and amount of this client-side code have been steadily increasing over the years. At the same time, new vulnerabilities keep being uncovered, for which we mostly rely on manual analysis of security experts. Unfortunately, such manual efforts do not scale to the problem space at hand. Therefore in this thesis, we present techniques capable of finding vulnerabilities automatically and at scale that originate from malicious inputs to postMessage handlers, polluted prototypes, and client-side storage mechanisms. Our results highlight that the investigated vulnerabilities are prevalent even among the most popular sites, showing the need for automated systems that help developers uncover them in a timely manner. Using the insights gained during our empirical studies, we provide recommendations for developers and browser vendors to tackle the underlying problems in the future. Furthermore, we show that security mechanisms designed to mitigate such and similar issues cannot currently be deployed by first-party applications due to their reliance on third-party functionality. This leaves developers in a no-win situation, in which either functionality can be preserved or security enforced.JavaScript ist die treibende Kraft hinter all den Web Applikationen, die wir heutzutage täglich nutzen. Allerdings ist über die Zeit hinweg gesehen die Masse, aber auch die Komplexität, von Client-seitigem JavaScript Code stetig gestiegen. Außerdem finden Sicherheitsexperten immer wieder neue Arten von Verwundbarkeiten, meistens durch manuelle Analyse des Codes. In diesem Werk untersuchen wir deshalb Methodiken, mit denen wir automatisch Verwundbarkeiten finden können, die von postMessages, veränderten Prototypen, oder Werten aus Client-seitigen Persistenzmechnanismen stammen. Unsere Ergebnisse zeigen, dass die untersuchten Schwachstellen selbst unter den populärsten Websites weit verbreitet sind, was den Bedarf an automatisierten Systemen zeigt, die Entwickler bei der rechtzeitigen Aufdeckung dieser Schwachstellen unterstützen. Anhand der in unseren empirischen Studien gewonnenen Erkenntnissen geben wir Empfehlungen für Entwickler und Browser-Anbieter, um die zugrunde liegenden Probleme in Zukunft anzugehen. Zudem zeigen wir auf, dass Sicherheitsmechanismen, die solche und ähnliche Probleme mitigieren sollen, derzeit nicht von Seitenbetreibern eingesetzt werden können, da sie auf die Funktionalität von Drittanbietern angewiesen sind. Dies zwingt den Seitenbetreiber dazu, zwischen Funktionalität und Sicherheit zu wählen

    Big Data Security (Volume 3)

    Get PDF
    After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology

    The Cold Culture Wars: The Fight for Democratic Education in Post-War New York

    Get PDF
    This dissertation explores how the American public school system has become the primary institution for citizens to project, contest, or affirm their values. Primarily, this revolves around competing ideas of democratic education. After World War II, politicians utilized the schools to propagate American democracy, while citizens viewed education as a means to reconstruct the post-war democratic order. Although most representatives acknowledged the schools needed to guard democracy and stem totalitarian aggression, few agreed on how education should accomplish such a feat. Consequently, democratic education deviated from its theoretical moorings and found a newly nationalistic expression in a Cold War era of scrutiny and hyper-politicization This development magnified the societal importance of the American school, as debates no longer hinged around purely education but rather over competing notions of American democracy. As educational policies took on new political dimensions, this simultaneously served to both cloud and enlarge the mission of American schools. Tasked with rehabilitating American democracy at home and fighting totalitarianism abroad, American education became freighted with a host of newfound responsibilities and obligations, often outside the schools\u27 reach. Accordingly these expanded obligations opened education up to newfound educational constituencies rife with critiques, as they evaluated the ability of American schools to live up to their democratic promise.;Indeed, no longer were educational disputes the sole domain of rival educational camps. Rather educational disputes once contained within schoolroom walls increasingly became hashed out in New York\u27s schools, churches, labor unions, civic centers, and neighborhoods. These educational disputes, heightened in fury, and feverish in pitch, ushered in a new era of educational controversy that became part of America\u27s Cold Culture Wars.

    Confluence and consequence: globalisation, viscosities and transformation of HIV risk environments in Vietnam

    Get PDF
    This thesis shows that illicit drug consumers in Vietnam who administer product via injection are vulnerable actors in a paradoxical global/local phenomenon rooted in historical complexities of globalisation. Therefore, responsibility for HIV risks should be shifted upstream from the level of individuals toward institutional processes that manufacture environments of harm. At the global level, the UN Milennium Development Goals do not provide the required level of leadership on HIV prevention for drug injectors. Association between globalisation, opiates and blood-born disease in Vietnam is not new and is inseparable from historical transportation, migration and trade processes. As a key locale in the Cold War, after 1975, and 1979 in particular, Vietnam was 'at distance' from increasing intra-regional trade flows across its western frontiers and northern border. As a consequence, it was hermetically sealed to nearby HIV sub-epidemics unfolding among heroin consumers. A latent HIV risk environment awaited Vietnam should geopolitical grievances be resolved and it became re-integrated among Mekong sub-regional flows. Neo-liberal financial flows returned to Vietnam in 1993 and the Mekong was spanned in 1994. In 1995 it normalised relations with the United States, joined ASEAN and announced the resurrection of transportation linkages across the northern border with China. Mid-decade, its borders were made more porous at the same time as local opium production was reduced as part of the UN global programme against drugs. Exploiting enhanced trans-boundary mobilities intended for goods, opiate traffickers quickly transformed Vietnam into a transit nation and a market for high-quality heroin well suited to a youthful population experiencing socio-economic change including new consumerism. Following traditional pathways, a radical transformation in the fluidity of drug consumption environs ensued, enabling more widespread and efficient flows of blood across complex boundaries. Analysis reveals that a spatio-temporal confluence of structural factors has created conditions which enabled this process. These factors are overlapping and they range from global influences, such as the collapse of the USSR, to micro-economic reform such as privatisation and modernisation of the domestic pharmaceutical sector. The transformation in opiate consumption from injecting opium to heroin injecting occurred faster than expert-driven prevention systems responded, even in time and space where this was most foreseeable. Although the opiate transformation was highly predictable, there has been a time-lag of almost a decade between risk transformations and policy responses equated with harm reduction principles. The thesis shows that blame for HIV sub-epidemics in Vietnam should not be attributed to vulnerable youths and young adults. Expert-driven economic transition associated with global intergration has manufactured circumstances in which drug availability has risen dramatically at a time when employment growth has been insufficient and a commercial sex industry has expanded. This research confirms the importance of new methods of risk environment analyses, particularly in relation to trans-boundary hazards associated with global flows, including trade and human mobilities

    The global resurgence of religion and the desecularization of American foreign policy, 1990-2012

    Get PDF
    This thesis conceptually and empirically explores how American foreign policy is changing under the domestic and international pressures brought about by social and cultural processes associated with the global resurgence of religion. It argues that in response to these pressures the American foreign policy establishment, and American diplomatic, foreign assistance and national security practices and institutions are gradually undergoing, since the end of the Cold War andespecially following September 11, processes of “desecularization”. In order to explain these foreign policy changes, this thesis develops a Historical Sociological (HS) approach to Foreign Policy Analysis (FPA). This theoretical framework allows investigating the complex causal mechanisms that have led to the emergence of “desecularizing actors” at the domestic American level, which are embedded or responding to macro-processes of religious resurgence at home and abroad. These desecularizing actors have mobilized at the micro-level to challenge at critical historical junctures what they perceive is the problematic secular character of American foreign policy intellectual traditions, state practices and policy-making structures. In order to advance their preferred inherently religious policy agendas, desecularizing actors have articulated a number of principled and strategic discourses, which enable them to successfully contest and renegotiate the boundaries between “the secular” and “the religious” in American foreign policy. This thesis draws from ongoing conceptual debates in the sociology of religion on desecularization and applies this concept to that of a state’s foreign policy. It unpacks how processes of desecularization have taken place at multiple levels and with different intensities across the American foreign policy apparatus. This thesis identifies two broad processes that relate to foreign policy desecularization. First, processes of “countersecularization” in terms of a growing entanglement between functionally differentiated American secular state practices and policy-making structures, and religious norms and actors. Second, processes of “counter-secularism” in terms of a progressive weakening of dominant secular epistemic, ideological, and normative ideational constructs among American policy-makers

    Vestiges of glory: Iraq's universities and female students in the midst of tyranny, sanctions and war.

    Get PDF
    This historical dissertation examines the intersectionality of sanctions, war and autocratic rule as it manifested itself on Iraqi university campuses and, more specifically, the impact on female students. While much has been written on Iraq, we have yet to understand the academic, personal and professional toll it took on university students between the onset of the Saddam regime in 1979 and 2005, three years after the Allied Invasion. This is a unique opportunity to study a higher education system that once held an esteemed regional reputation and is now greatly eroded. Our ability to generate historical research on this population enhances our knowledge of the role political and economic events play on university campuses. The historical method was employed in this dissertation and expanded upon by Iraqi women's narratives. Primary and contextual sources were collected, coded and reconstructed thematically and chronologically. Findings included increasing obstacles and restrictions placed on academic freedom and women's higher education opportunities as the regime increased its power. Iraqi women reported that the decade of sanctions was the most damaging to their college learning but that current civil unrest and rising Islamist factions are greatly hindering their ability to achieve academic goals. The intersectionality of three wars (First Gulf, Iran-Iraq and Second Gulf Wars), shifting Saddamist law concerning women's rights, and international sanctions diminished women's learning, social and professional engagements at Iraqi universities. Efforts to rehabilitate Iraqi higher education must include international partnerships, expatriate alumni participation, gender integration and authentic student advocacy opportunities
    corecore