izpis_h1_title_alt

Navidezni stroj s sledenjem pretoku informacij z označevanjem
ID Habjan, Lovro (Author), ID Čibej, Uroš (Mentor) More about this mentor... This link opens in a new window, ID Mihelič, Jurij (Co-mentor)

.pdfPDF - Presentation file, Download (482,41 KB)
MD5: 76A2B79D1BD6DB0CDB704CE88F74BB2E

Abstract
Računalniška varnost je zahtevno področje, med katerega spada zagotavljanje lastnosti podatkov, kot sta zaupnost in celovitost. Na njih vpliva pretok informacij znotraj računalniškega sistema. V okviru magistrske naloge smo predelali obstoječ navidezni stroj za arhitekturo strojnih ukazov RISC-V z zmožnostjo sledenja pretoku informacij. Na podlagi predhodnih raziskav smo za sledenje uporabili označevanje podatkov znotraj računalniškega sistema. Zasnovali smo prilagodljiv in čim bolj splošen mehanizem, ki deluje na podlagi pravil, definiranih v okviru uporabniške varnostne politike. Razširjeni navidezni stroj je s pomočjo označevanja zmožen slediti pretoku informacij ter je sposoben varovati podatke in njihove lastnosti. Njegovo delovanje smo ovrednotili z naborom testnih primerov, ki prikazujejo različne scenarije uporabe.

Language:Slovenian
Keywords:označevanje, navidezni stroj, pretok informacij, varnostna politika, računalniška varnost
Work type:Master's thesis/paper
Typology:2.09 - Master's Thesis
Organization:FRI - Faculty of Computer and Information Science
Year:2022
PID:20.500.12556/RUL-142892 This link opens in a new window
COBISS.SI-ID:133125635 This link opens in a new window
Publication date in RUL:30.11.2022
Views:433
Downloads:60
Metadata:XML RDF-CHPDL DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Virtual machine with tag-based information flow tracking
Abstract:
Computer security is a complex area, which includes protection of data and its characteristics, such as confidentiality and integrity. These are affected by information flow within a computer system. We redesigned an existing virtual machine for RISC-V instruction set architecture to support information flow tracking. Based on previous research, data tagging was used for tracking. We designed a flexible and high-level mechanism that operates based on rules described in a user-defined security policy. The redesigned virtual machine is able to track information flow using tagging and is able to protect the data and its characteristics. Its performance was evaluated with a set of test cases showing different scenarios of use.

Keywords:tagging, virtual machine, information flow, security policy, computer security

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back