Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/95121
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2022-05-05T12:43:45Z-
dc.date.available2022-05-05T12:43:45Z-
dc.date.issued2014-
dc.identifier.citationSpiteri, A. (2014). Secure installation of un-trusted applications (Bachelor's dissertation).en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/95121-
dc.descriptionB.Sc. IT (Hons)(Melit.)en_GB
dc.description.abstractMalware is one of the current dominant threats to desktop systems. A popular infection vector for malware is through downloads. Malware, specifically Trojans, disguises itself inside seemingly harmless software, which when downloaded and installed wreaks havoc on the system. Un-trusted software is downloaded and installed by naive users daily, potentially exposing their computer system to malware. Current state of the art solutions provide minimal protection during installation and fail to adequately protect desktop systems. In this project, we introduce CISSIA, a configurable isolation system for the safe installation of un-trusted applications. CISSIA isolates the operating system from changes done during the installation, extracts and reports the behaviour of the installer to users to help them decide whether to merge the resulting installation to the host system. Key techniques used by CISSIA include dynamic binary translation at process level, which allows for modification of the code on the fly, without the need for modifying the original code; namespace redirection and copy-on-write (COW), where operating system resources are isolated on writing through renaming; configurable isolation is achieved through a set of policy protection levels; and extraction of suspicious behaviour through analyzing of system library calls made by the installer. The main technical challenges of this project included handling the complexity of installations, discriminating between benign and malicious behaviour and dynamic binary code re-writing. Results show that isolation can be successfully implemented by dynamic binary translation at user level. The behaviour of the un-trusted application can be successfully extracted through analyzing of calls made by the installer. Isolation level can be effectively configured in order to block malicious installers whilst not breaking the execution of benign ones. Results also show that installations run under CISSIA can be correctly merged into the host system without breaking.en_GB
dc.language.isoenen_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectComputer securityen_GB
dc.subjectComputer virusesen_GB
dc.subjectComputer networks -- Security measuresen_GB
dc.titleSecure installation of un-trusted applicationsen_GB
dc.typebachelorThesisen_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.publisher.institutionUniversity of Maltaen_GB
dc.publisher.departmentFaculty of Information and Communication Technology. Department of Computer Scienceen_GB
dc.description.reviewedN/Aen_GB
Appears in Collections:Dissertations - FacICT - 2014
Dissertations - FacICTCS - 2010-2015

Files in This Item:
File Description SizeFormat 
BSC(HONS)ICT_Spiteri, Annabel_2014.PDF
  Restricted Access
6.33 MBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.