AV
A. Voulimeneas
7 records found
1
WALL-EYE: Taking a look at CubeSat security
Security analysis of CubeSats on a physical testbed
With the rise of new space, space missions are becoming increasingly more accessible. This is caused by the increased use of commercial-off-the-shelf components as well as the possibility of having multiple parties operating on a single satellite platform. This development combin
...
An analysis of system call set extraction tools on configurable Linux binaries
Comparing the performance of various system call set extraction tools on various configurations of the busybox application
System calls are a primary way in which applications to communicate with the kernel. This is to allow them to perform sensitive tasks, however, an application will typically not require all of the system calls available to function properly. Despite this, the Linux kernel allows
...
Exploring automated system call sandbox policy generation
Investigating and comparing static and dynamic analysis approaches to generate system call policies
System call sandboxing is the idea to restrict the set of system calls an application is able to invoke.
This reduces the attack surface available to an attacker exploiting the binary, and adheres to the principle of least privilege, giving entities the minimum required permi ...
This reduces the attack surface available to an attacker exploiting the binary, and adheres to the principle of least privilege, giving entities the minimum required permi ...
System Call Sandboxing
Comparing static and dynamic analysis and filter generation
All complex programs are bound to contain software bugs, of which some could be exploited. These exploits rely on the application being able to start – or become – a process that it should not normally. To exploit these applications in this way, the attacker needs the operating s
...
System Call Sandboxing: Enhancing Security Through Analysis
Comparing Dynamic and Static System Call Analysis for Diff and SSH
Sandboxing is a technique that restricts software applications’ access to system resources to limit unintended harmful behaviour. These measures may include limiting the number of system calls that can be used. This paper compares dynamic and static analysis methods for dete
...
System Call Sandboxing
Analysis of PWD and NGINX system call policy generation using dynamic and static techniques
System call sandboxing represents a pivotal security measure in the contemporary digital landscape, where reducing the attack surface of applications is crucial to mitigate potential cyber threats. This paper investigates the efficacy of static versus dynamic system call filterin
...
Small embedded devices are becoming more prevalent in the world with each passing year to improve our quality of life. However, as more devices are created, an increasing number of older devices are declared obsolete despite still being used. This results in an increasing amount
...