Trojan messages are messages that seem correct to the re-ceiver but cannot be generated by any correct sender. Such messages constitute major vulnerability points of a dis-tributed system—they constitute ideal targets for a malicious actor and facilitate failure propagation across nodes. We de-scribe Achilles, a tool that searches for Trojan messages in a distributed system. Achilles uses dynamic white-box analysis on the distributed system binaries in order to infer the predicate that defines messages parsed by receiver nodes and generated by sender nodes, respectively, and then com-putes Trojan messages as the difference between the two. We apply Achilles on implementations of real distributed systems: FSP, a file transfer application, an...
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is a...
In this paper, we show that distributed systems are vul- nerable to routing attacks and propose an a...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. A...
Modern software is plagued by elusive corner-case bugs (e.g., security vulnerabilities). There are n...
In this paper we present a technique for automatically assessing the amount of damage a small number...
Security bugs in network-based applications allow an attacker to compromise a system from the networ...
Thanks to the latest evolutions in hardware and networking technologies we live in a world where net...
Failures in computing systems are unavoidable. Therefore, it is important to detect and diagnose fai...
Security and performance are critical goals for distributed systems. The increased complexity in des...
As malicious programs, Trojan horses have become a huge threat to computer networks security. Trojan...
In contrast to most benign applications, malware infects its host system. It does so via system-wide...
Consider a distributed system that delivers each message from a process to its destination if the me...
Testing the components of a distributed system is challenging as it requires consideration of not ju...
ENGLISH: In this master’s thesis we show how we can use the Application Programming Interface (API) ...
Modern software is plagued by elusive corner-case bugs (e.g., security bugs). Because there are no s...
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is a...
In this paper, we show that distributed systems are vul- nerable to routing attacks and propose an a...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. A...
Modern software is plagued by elusive corner-case bugs (e.g., security vulnerabilities). There are n...
In this paper we present a technique for automatically assessing the amount of damage a small number...
Security bugs in network-based applications allow an attacker to compromise a system from the networ...
Thanks to the latest evolutions in hardware and networking technologies we live in a world where net...
Failures in computing systems are unavoidable. Therefore, it is important to detect and diagnose fai...
Security and performance are critical goals for distributed systems. The increased complexity in des...
As malicious programs, Trojan horses have become a huge threat to computer networks security. Trojan...
In contrast to most benign applications, malware infects its host system. It does so via system-wide...
Consider a distributed system that delivers each message from a process to its destination if the me...
Testing the components of a distributed system is challenging as it requires consideration of not ju...
ENGLISH: In this master’s thesis we show how we can use the Application Programming Interface (API) ...
Modern software is plagued by elusive corner-case bugs (e.g., security bugs). Because there are no s...
Trojan horse is said to be one of the most serious threats to computer security. A Trojan horse is a...
In this paper, we show that distributed systems are vul- nerable to routing attacks and propose an a...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. A...