Identifying communications of running programs through their assembly level execution traces
| dc.contributor.author | Huang, Huihui | |
| dc.contributor.supervisor | German, Daniel M. | |
| dc.date.accessioned | 2018-05-28T21:15:41Z | |
| dc.date.copyright | 2018 | en_US |
| dc.date.issued | 2018-05-28 | |
| dc.degree.department | Department of Computer Science | |
| dc.degree.level | Master of Science M.Sc. | en_US |
| dc.description.abstract | Understanding the communications between programs can help software security engineers understand the behaviour of a system and detect vulnerabilities in a system. Assembly-level execution traces are used for this purpose for two reasons: 1) lack of source code of the running programs, and 2) assembly-level execution traces provide the most accurate run-time behaviour information. In this thesis, I present a communication analysis approach using such execution traces. I first model the message based communication in the context of trace analysis. Then I develop a method and the necessary algorithms to identify communications from a dual trace which consist of two assembly level execution traces. A prototype is developed for communication analysis. Finally, I conducted two experiments for communication analysis of interacting programs. These two experiments show the usefulness of the designed communication analysis approach, the developed algorithms and the implemented prototype. | en_US |
| dc.description.embargo | 2019-05-11 | |
| dc.description.scholarlevel | Graduate | en_US |
| dc.identifier.bibliographicCitation | Huihui Nora Huang, Eric Verbeek, Daniel German, Margaret-Anne Storey, and Martin Salois. Atlantis: Improving the analysis and visualization of large assembly execution traces. In Software Maintenance and Evolution (ICSME), 2017 IEEE International Conference on, pages 623–627. IEEE, 2017. | en_US |
| dc.identifier.uri | http://hdl.handle.net/1828/9401 | |
| dc.language | English | eng |
| dc.language.iso | en | en_US |
| dc.rights | Available to the World Wide Web | en_US |
| dc.subject | Assembly trace analysis | en_US |
| dc.subject | communication analysis | en_US |
| dc.subject | software security | en_US |
| dc.subject | vulnerability | en_US |
| dc.subject | dynamic analysis | en_US |
| dc.title | Identifying communications of running programs through their assembly level execution traces | en_US |
| dc.type | Thesis | en_US |