Loading...
Search for: security-vulnerability
0.005 seconds

    Improving Security of Flash-Based Solid State Disks

    , M.Sc. Thesis Sharif University of Technology Samadi, Nasibeh (Author) ; Asadi, Hossein (Supervisor)
    Abstract
    One of the most intrinsic challenges of flash-based Solid State Drives (SSDs) is erasebefore-write limitation and the limited endurance of flash chips. Wear leveling and garbage collection are two mechanisms implemented in SSD’s controller to enhance endurance and performance. While wear leveling attempts to distribute erasures across all blocks in an even manner, it imposes a new security challenge on SSD,which leads to the presence of invalid data blocks in flash chips. Therefore, some data blocks that are logically deleted by the user are still available in flash chips and can be recovered by software or hardware recovery tools.
    In this paper, a new criteria named vulnerability time... 

    Analysis of Program Vulnerabilities in Computer Network

    , M.Sc. Thesis Sharif University of Technology Shiralinia, Ahmad (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Reduction of security vulnerabilities is an important goal in software development process. Insufficient validation of application inputs is one of the spreading issues in security vulnerabilities matter. In our approach, we attempt to analyze an application code to find all potential vulnerable points which require validation, and offer some solution for preventing them from being exploited. In this thesis, we propose a framework to detect the application security vulnerabilities. Our framework focuses on validation vulnerabilities that caused by improper validation of user inputs. In this framework, a model of relations among the objects and elements of the application code is built and a... 

    Vulnerability Extraction in Large Codebases Through Template Generalization

    , Ph.D. Dissertation Sharif University of Technology Salimi, Solmaz (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    As the size and complexity of software increase, the number of software vulnerabilities also increases. An examination of vulnerability reports shows that in addition to the fact that a large number of unknown vulnerabilities still exist in software, there is still no proper solution for identifying vulnerabilities that have been observed one sample of them exit in real-world software. The main reason for such an event is the lack of a suitable template for recognized vulnerabilities, which ultimately makes searching for them in other software a problem of scalability and high search cost. This thesis, recognizing the importance of the issue, presents a framework for extracting robust and... 

    Making HeNB more secure with improved secure access protocol and analyzing it

    , Article Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 16 September 2015 through 18 September 2015 ; Volume 158 , 2015 , Pages 107-120 ; 18678211 (ISSN) ; 9783319269245 (ISBN) Ghasemi Najm, F ; Payandeh, A ; Habibi, H ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    The 3rd Generation Partnership Project (3GPP) defined a new architecture, called Home eNode B (HeNB). HeNB is able to provide new services with higher data rate in a low cost. Security is a critical aspect of HeNB. In order to have HeNB secure access to core network, 3GPP defines an authentication protocol based on IKEv2. A number of security vulnerabilities such as HeNB masquerading have not been addressed and solved by 3GPP technical specification yet. In this paper an improved HeNB authentication protocol is introduced which does not allow an attacker to connect unauthorized network users using a mask. Finally, we evaluate our protocol performance and verify it by Automated Validation of... 

    A fuzzy fully distributed trust management system in wireless sensor networks

    , Article AEU - International Journal of Electronics and Communications ; Volume 70, Issue 1 , 2016 , Pages 40-49 ; 14348411 (ISSN) Jadidoleslamy, H ; Aref, M.R ; Bahramgiri, H ; Sharif University of Technology
    Elsevier GmbH  2016
    Abstract
    Wireless sensor networks (WSNs) usually consist of many tiny sensor nodes and a Sink. Problems like nodes' misbehavior due to malicious, compromised or selfishness intentions, and WSNs' security vulnerabilities against different attacks due to free and unprotected communications, untrusted and broadcasted transmissions, hostile environments and limited resources, degrade the security and overall performance of WSNs. In another direction, most of the traditional security mechanisms are unsuitable for WSNs. One significant security solution against these problems is Trust Management System (TMS); TMS enhances the security by detecting the nodes' abnormal behaviors; it improves the cooperation... 

    Inferring API correct usage rules: A tree-based approach

    , Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 78-84 ; 9781728143736 (ISBN) Zolfaghari, M ; Salimi, S ; Kharrazi, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    The lack of knowledge about API correct usage rules is one of the main reasons that APIs are employed incorrectly by programmers, which in some cases lead to serious security vulnerabilities. However, finding a correct usage rule for an API is a time-consuming and error-prone task, particularly in the absence of an API documentation. Existing approaches to extract correct usage rules are mostly based on majority API usages, assuming the correct usage is prevalent. Although statistically extracting API correct usage rules achieves reasonable accuracy, it cannot work correctly in the absence of a fair amount of sample usages. We propose inferring API correct usage rules independent of the... 

    Analysis and Evaluation of Security Vulnerabilities of Precision time Protocol (PTP) and Securing IEEE61850 based Digital Substations

    , Ph.D. Dissertation Sharif University of Technology Moradi, Mohsen (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Nowadays, power systems and substations are the most important components of the vital infrastructure of a country, which handle the production, transmission and distribution of the electrical energy. Automation systems increase the efficiency of the power industry while making remote control possible, but the use of computer-based control systems is a potential field for cyberattacks which may cause equipment destruction and electricity network destabilization. One of the main requirements for the utilization of digital substations is the synchronization between different equipment used in it. Several algorithms and protocols have been proposed so far for time synchronization in distributed... 

    Is really NACK protocol secure to be employed in MANETs?

    , Article Proceedings - 17th IEEE International Conference on Computational Science and Engineering, CSE 2014, Jointly with 13th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2014, 13th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2014 and 8th International Conference on Frontier of Computer Science and Technology, FCST 2014, 19 December 2014 through 21 December 2014 ; 2015 , Pages 1644-1647 ; 9781479979813 (ISBN) Saeed, M ; Mackvandi, A ; Taghavi, M ; Zare Bidoki, M ; Ghasemi, M ; Neshati, A ; Liu, X ; El Baz, D ; Kang, K ; Hsu, C. H ; Chen, W ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    MANET, which stands for Mobile Ad-hoc Network, is composed of a group of self-organized and wireless nodes that do not possess any predictable and fixed infrastructure. When nodes want to communicate with each other, they have to pass on their messages directly or indirectly. In case the destination node is out of the transmission range, the source node has to rely on intermediate nodes, which, in this case, is called indirect transmission. On the other hand, if the destination node is the neighboring node, there is no need to employ intermediate nodes, which, in this case, is called direct transmission. Over the past years, security issues in MANETs have received a great deal of attention... 

    A statistical distributed multipath routing protocol in wireless sensor networks

    , Article International Journal of Internet Protocol Technology ; Volume 9, Issue 4 , 2016 , Pages 161-173 ; 17438209 (ISSN) Jadidoleslamy, H ; Aref, M. R ; Bahramgiri, H ; Sharif University of Technology
    Inderscience Enterprises Ltd  2016
    Abstract
    Wireless sensor networks (WSNs) usually consist of many tiny sensor nodes and a sink. Problems and characteristics like resources' severe constraints, low reliability and fault tolerance, low throughput, and insecure operational environments, significantly degrade their overall performance. One significant solution against these problems is multipath routing. However, the existing multipath routing protocols have weaknesses like high overhead and algorithmic-computational complexity, security vulnerabilities, low scalability, and permanent usage of optimal paths and resources' severe exhaustion. As a result, this paper proposes a statistical distributed multipath routing protocol for...