Loading...
Search for: vulnerability-analysis
0.012 seconds

    Using CSP to model and analyze transmission control protocol vulnerabilities within the broadcast network

    , Article Proceedings - 2004 International Networking and Communication Conference, INCC 2004, Lahore, 11 June 2004 through 13 June 2004 ; 2004 , Pages 42-47 ; 0780383257 (ISBN) Shahriari, H. R ; Jalili, R ; Sharif University of Technology
    2004
    Abstract
    Spreading networks and increasing their complexity has complicated the task of security analysis. Accordingly, automatic verification approaches have received more attention recently. In this paper, we modeled a network including a set of hosts (clients and servers) using the process algebra CSP in order to verify the Transmission Control Protocol (TCP) behavior against an active intruder. The model is verified using the FDR tool and as a result, some attack scenarios violating the security are found. The scenarios showes how an intruder can compromise the server trust to its clients. As the model is modular, extendable, and scalable, more complex attack scenarios (combination of simple... 

    Vulnerability analysis in VGBPS using prolog

    , Article 2nd IPM International Symposium on Fundamentals of Software Engineering, FSEN 2007, Tehran, 17 April 2007 through 19 April 2007 ; Volume 4767 LNCS , 2007 , Pages 404-411 ; 03029743 (ISSN); 9783540756972 (ISBN) Rafiei, M. E ; Taherian, M ; Mousavi, H ; Movaghar, A ; Jalili, R ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    Vulnerabilities are now part of all software systems. To handle vulnerabilities, many approaches have been proposed till now. Many of these approaches try to analyze vulnerabilities based on model checking techniques. However, the models used in these approaches handle authorized and unauthorized rules separately. This basically cause in weaker modeling abilities and consequently weaker vulnerability analysis. From authorized and unauthorized rules, we mean those emanated from access control model and those originated from vulnerabilities respectively. Currently, a new general graph-based protection system concentrating on vulnerabilities called VGBPS is proposed to overcome the mentioned... 

    Analysis of Client Side Vulnerabilities in Microservice-based Systems

    , M.Sc. Thesis Sharif University of Technology Basiri Abarghouei, Mohammad (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Nowadays, software systems face many challenges that relate to their maintenance, scalability, and development. To address these challenges, many large software systems have moved away from monolithic architecture and adopted a microservicesbased architecture. However, microservices-based systems face security challenges due to their distributed nature, complex dependencies, and diverse implementation technologies. This study specifically examines architecture-based threats, which fall under the program logic-based category. Previous research has required access to the server-side architecture to recover the architecture of the system, but this study proposes a method for recovering the... 

    CLASS: Combined logic and architectural soft error sensitivity analysis

    , Article Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC ; 2013 , Pages 601-607 ; 9781467330299 (ISBN) Ebrahimi, M ; Chen, L ; Asadi, H ; Tahoori, M. B ; Sharif University of Technology
    2013
    Abstract
    With continuous technology downscaling, the rate of radiation induced soft errors is rapidly increasing. Fast and accurate soft error vulnerability analysis in early design stages plays an important role in cost-effective reliability improvement. However, existing solutions are suitable for either regular (a.k.a address-based such as memory hierarchy) or irregular (random logic such as functional units and control logic) structures, failing to provide an accurate system-level analysis. In this paper, we propose a hybrid approach integrating architecture-level and logic-level techniques to accurately estimate the vulnerability of all regular and irregular structures within a microprocessor.... 

    Vulnerability take grant (VTG): an efficient approach to analyze network vulnerabilities

    , Article Computers and Security ; Volume 26, Issue 5 , 2007 , Pages 349-360 ; 01674048 (ISSN) Shahriari, H. R ; Jalili, R ; Sharif University of Technology
    2007
    Abstract
    Modeling and analyzing information system vulnerabilities help predict possible attacks to computer networks using vulnerabilities information and the network configuration. In this paper, we propose a comprehensive approach to analyze network vulnerabilities in order to answer the safety problem focusing on vulnerabilities. The approach which is called Vulnerability Take Grant (VTG) is a graph-based model consists of subject/objects as nodes and rights/relations as edges to represent the system protection state. Each node may have properties including single vulnerabilities such as buffer overflow. We use the new concept of vulnerability rewriting rule to specify the requirements and... 

    Using description logics for network vulnerability analysis

    , Article International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06, Morne, 23 April 2006 through 29 April 2006 ; Volume 2006 , 2006 ; 0769525520 (ISBN); 9780769525525 (ISBN) Zakeri, R ; Jalili, R ; Abolhassani, H ; Shahriari, H. R ; Sharif University of Technology
    2006
    Abstract
    The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model which could be used to analyze TCP/IP networks against attacks.... 

    A novel matrix based systematic approach for vulnerability assessment

    , Article COMPEL - The International Journal for Computation and Mathematics in Electrical and Electronic Engineering ; Volume 40, Issue 1 , 2021 , Pages 1-17 ; 03321649 (ISSN) Sabouhi, H ; Doroudi, A ; Fotuhi Firuzabad, M ; Bashiri, M ; Sharif University of Technology
    Emerald Group Holdings Ltd  2021
    Abstract
    Purpose: This paper aims to propose a novel matrix-based systematic approach for vulnerability assessment. Design/methodology/approach: The proposed method consists of two major steps. First, the power network is modeled as a topological combination of edges (transmission lines, transformers, etc.) and nodes (buses, substations, etc.). The second step is to use an axiomatic design-based index for topology analysis. This index is based on the systematic counting of possible routes from the start (generators) to destination (loads), considering load importance, before and after a disruption. Findings: The effectiveness of the proposed method is demonstrated through an illustrative example and... 

    Gramian-based vulnerability analysis of dynamic networks

    , Article IET Control Theory and Applications ; Volume 16, Issue 6 , 2022 , Pages 625-637 ; 17518644 (ISSN) Babazadeh, M ; Sharif University of Technology
    John Wiley and Sons Inc  2022
    Abstract
    In this paper, the vulnerability of large-dimensional dynamic networks to false data injections is analysed. The malicious data can manipulate input injection at the control nodes and affect the outputs of the network. The objective is to analyse and quantify the potential vulnerability of the dynamics by such adversarial inputs when the opponents try to avoid being detected as much as possible. A joint set of most effective actuation nodes and most vulnerable target nodes are introduced with minimal detectability by the monitoring system. Detection of this joint set of actuation-target nodes is carried out by introducing a Gramian-based measure and reformulating the vulnerability problem as... 

    Inferring APIs Correct Usage Rules From Their Source Code

    , M.Sc. Thesis Sharif University of Technology Zolfaghari, Majid (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Researchers show that one of the critical sources of bugs is API incorrect usage which in some cases can cause serious security vulnerabilities. The lack of knowledge about API correct usage rules is one of the main reasons that APIs are employed incorrectly by programmers, however, nding a correct usage rule for an API is time-consuming and error-prone particularly without having access to API documentation in most cases. Existing approaches to automatically extract correct usage rules, consider the majority usages as the correct rule for an API. Although statistically extracting API correct usage rules can achieve reasonable accuracy, it cannot work correctly in the absence of fair amount... 

    Fragility and Risk Analysis of Electrical Substation Equipment Using Reliability and Endurance Time Methods

    , M.Sc. Thesis Sharif University of Technology Delaviz Bonab, Arman (Author) ; Esmail Pourestekanchi, Homayoon (Supervisor)
    Abstract
    Electrical substations and its vital components such as switchgears, have experienced severe damage during recent earthquakes, followed by widespread blackouts around the world. To improve the seismic resiliency of power grids and use probabilistic decision-making frameworks, comprehensive fragility data for the different equipment is needed. The purpose of this study is to assess the vulnerability of equipment in substations and to develop fragility curves for this equipment. For this purpose, four main equipment of switchgear, namely circuit breaker, disconnect switch, current transformer and surge arrester, have been modeled in three dimensions and verified. After examining the different... 

    Detection and Mitigation of Application-Layer Denial of Service Attacks

    , M.Sc. Thesis Sharif University of Technology Hadadian Neghad Yousefi, Mohammad (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    With increasing the internet in sociality, lots of researches have been done about web security in three main principles: confidentiality, integrity, and availability. Attacks on availability have been there for lots of time and high-rate denial of service attacks ran against servers. These years lots of web applications have been developed with various and complex technologies and so we are facing another type of low-cost DoS attack on the application layer where attackers can crash down services by exploiting flaws in implementations by just a single carefully crafted request. Although works on finding vulnerabilities are worthy, as there are always some flaws in applications, we need... 

    Software Vulnerability Characterization

    , M.Sc. Thesis Sharif University of Technology Ebrahimzadeh, Maryam (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Today, lots of vulnerabilities are discovered by researchers who are analyzing the software. Some researchers study these discovered vulnerabilities and find new ones that are similar to them. So they need to first characterize each previously discovered vulnerability and extract the vulnerable context of the program, then extract new vulnerabilities based on that. Some vulnerabilities are emerging because of developer mistakes in the implementation phase. Software developers use different function calls to do the goal of the program. Incorrect invocation for functions can lead to critical vulnerabilities. Our investigation shows that the root cause for some vulnerabilities is incorrect... 

    Analysis of Program Vulnerabilities in Computer Network

    , M.Sc. Thesis Sharif University of Technology Shiralinia, Ahmad (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Reduction of security vulnerabilities is an important goal in software development process. Insufficient validation of application inputs is one of the spreading issues in security vulnerabilities matter. In our approach, we attempt to analyze an application code to find all potential vulnerable points which require validation, and offer some solution for preventing them from being exploited. In this thesis, we propose a framework to detect the application security vulnerabilities. Our framework focuses on validation vulnerabilities that caused by improper validation of user inputs. In this framework, a model of relations among the objects and elements of the application code is built and a... 

    Investigating the effects of process variations and system workloads on reliability of STT-RAM caches

    , Article Proceedings - 2016 12th European Dependable Computing Conference, EDCC 2016, 5 September 2016 through 9 September 2016 ; 2016 , Pages 120-129 ; 9781509015825 (ISBN) Cheshmikhani, E ; Hosseini Monazzah, A. M ; Farbeh, H ; Miremadi, S. G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    In recent years, STT-RAMs have been proposed as a promising replacement for SRAMs in on-chip caches. Although STT-RAMs benefit from high-density, non-volatility, and low-power characteristics, high rates of read disturbances and write failures are the major reliability problems in STTRAM caches. These disturbance/failure rates are directly affected not only by workload behaviors, but also by process variations. Several studies characterized the reliability of STTRAM caches just for one cell, but vulnerability of STT-RAM caches cannot be directly derived from these models. This paper extrapolates the reliability characteristics of one STTRAM cell presented in previous studies to the... 

    Analysis and Evaluation of Security Vulnerabilities of Precision time Protocol (PTP) and Securing IEEE61850 based Digital Substations

    , Ph.D. Dissertation Sharif University of Technology Moradi, Mohsen (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Nowadays, power systems and substations are the most important components of the vital infrastructure of a country, which handle the production, transmission and distribution of the electrical energy. Automation systems increase the efficiency of the power industry while making remote control possible, but the use of computer-based control systems is a potential field for cyberattacks which may cause equipment destruction and electricity network destabilization. One of the main requirements for the utilization of digital substations is the synchronization between different equipment used in it. Several algorithms and protocols have been proposed so far for time synchronization in distributed... 

    Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca

    , Article Computers and Electrical Engineering ; Volume 36, Issue 5 , 2010 , Pages 874-885 ; 00457906 (ISSN) Shahriari, H. R ; Makarem, M. S ; Sirjani, M ; Jalili, R ; Movaghar, A ; Sharif University of Technology
    2010
    Abstract
    Increasing use of networks and their complexity make the task of security analysis more and more complicated. Accordingly, automatic verification approaches have received more attention recently. In this paper, we investigate applying of an actor-based language based on reactive objects for analyzing a network environment communicating via Transport Protocol Layer (TCP). The formal foundation of the language and available tools for model checking provide us with formal verification support. Having the model of a typical network including client and server, we show how an attacker may combine simple attacks to construct a complex multiphase attack. We use Rebeca language to model the network... 

    A novel matrix based systematic approach for vulnerability assessment

    , Article COMPEL - The International Journal for Computation and Mathematics in Electrical and Electronic Engineering ; 2020 Sabouhi, H ; Doroudi, A ; Fotuhi Firuzabad, M ; Bashiri, M ; Sharif University of Technology
    Emerald Group Holdings Ltd  2020
    Abstract
    Purpose: This paper aims to propose a novel matrix-based systematic approach for vulnerability assessment. Design/methodology/approach: The proposed method consists of two major steps. First, the power network is modeled as a topological combination of edges (transmission lines, transformers, etc.) and nodes (buses, substations, etc.). The second step is to use an axiomatic design-based index for topology analysis. This index is based on the systematic counting of possible routes from the start (generators) to destination (loads), considering load importance, before and after a disruption. Findings: The effectiveness of the proposed method is demonstrated through an illustrative example and... 

    Topological analysis of multi-phase attacks using expert systems

    , Article Journal of Information Science and Engineering ; Volume 24, Issue 3 , 2008 , Pages 743-767 ; 10162364 (ISSN) Shahriari, H. R ; Ganjisaffar, Y ; Jalili, R ; Habibi, J ; Sharif University of Technology
    2008
    Abstract
    With the increasing number and complexity of network attacks, the demand for automatic vulnerability analysis tools has increased. The prerequisite of making these tools is to have a formal and precise model of network configurations and vulnerabilities. Utilizing this model, network administrators can analyze the effects of vulnerabilities on the network and complex attack scenarios can be detected before happening. In this paper, we present a general logic-based framework for modeling network configurations and topologies. Then, a number of important and wide-spread network vulnerabilities are modeled as general inference rules based on the framework definitions. We implemented the...