Disciplined techniques for the analysis and protection of security-critical systems

DSpace/Manakin Repository

Show simple item record

dc.contributor.advisor Focardi, Riccardo it_IT
dc.contributor.author Tempesta, Mauro <1990> it_IT
dc.date.accessioned 2018-12-11 it_IT
dc.date.accessioned 2019-07-24T08:06:43Z
dc.date.available 2019-07-24T08:06:43Z
dc.date.issued 2019-03-20 it_IT
dc.identifier.uri http://hdl.handle.net/10579/15008
dc.description.abstract In the last years most of our daily activities have moved to the digital world, including sensitive operations related to health data management and financial processes. Security flaws in the systems running these critical operations may have a serious impact on our society, ranging from breaches of citizens privacy to severe economical damages. Several aspects must be taken into account when reasoning on the security of critical systems, comprising the security of the networks where they are hosted and the security of web applications running on these systems. Additional threats are posed by the improper use of cryptography that may allow unintended disclosure of confidential data. In this thesis we propose a set of disciplined techniques for the analysis and protection of security-critical systems regarding these important aspects. For what concerns network security, we propose a technique to decompile firewall policies into abstract specifications giving a high-level description of the firewall behavior. Additionally, we study the problem of cross-compiling policies to different firewall systems. About web security, we survey the techniques proposed in the literature and by web standards to tackle the most common attacks against web sessions and we carefully evaluate them in terms of usability, compatibility with existing websites and ease of deployment. Furthermore, we propose a client-side approach to strengthen the security of Web protocols by monitoring their execution inside the browser. Regarding cryptography, we provide a detailed analysis of Java keystores, encrypted files that are used to securely store cryptographic keys by Java applications. We report novel attacks and weaknesses found in the most widespread keystore implementations and report on the fixes implemented by Java developers after our responsible disclosure. it_IT
dc.language.iso en it_IT
dc.publisher Università Ca' Foscari Venezia it_IT
dc.rights © Mauro Tempesta, 2019 it_IT
dc.title Disciplined techniques for the analysis and protection of security-critical systems it_IT
dc.title.alternative it_IT
dc.type Doctoral Thesis it_IT
dc.degree.name Informatica it_IT
dc.degree.level Dottorato di ricerca it_IT
dc.degree.grantor Dipartimento di Scienze Ambientali, Informatica e Statistica it_IT
dc.description.academicyear Dottorato - 31° Ciclo - 2015-2017 it_IT
dc.description.cycle 31
dc.degree.coordinator Focardi, Riccardo it_IT
dc.location.shelfmark D001959
dc.location Venezia, Archivio Università Ca' Foscari, Tesi Dottorato it_IT
dc.rights.accessrights openAccess it_IT
dc.thesis.matricno 827400 it_IT
dc.format.pagenumber X, 157 p.
dc.subject.miur INF/01 INFORMATICA it_IT
dc.description.note it_IT
dc.degree.discipline it_IT
dc.contributor.co-advisor it_IT
dc.provenance.upload Mauro Tempesta (827400@stud.unive.it), 2018-12-11 it_IT
dc.provenance.plagiarycheck Riccardo Focardi (focardi@unive.it), 2019-01-18 it_IT


Files in this item

This item appears in the following Collection(s)

Show simple item record