dc.contributor.advisor | Kumar, Vimal | |
dc.contributor.author | Corrick, Tristan James Carlile | |
dc.date.accessioned | 2021-05-05T03:57:29Z | |
dc.date.available | 2021-05-05T03:57:29Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Corrick, T. J. C. (2021). Progger 3: A low-overhead, tamper-proof provenance system (Thesis, Master of Cyber Security (MCS)). The University of Waikato, Hamilton, New Zealand. Retrieved from https://hdl.handle.net/10289/14280 | en |
dc.identifier.uri | https://hdl.handle.net/10289/14280 | |
dc.description.abstract | Data provenance, which describes how data is accessed and used since the time it is created, is a valuable resource with a wide range of uses. It can be used simply to know who has accessed one's data, or be used in more complex scenarios such as detecting malware. One method for collecting data provenance is to observe system calls. This thesis presents Progger 3, a system that observes system calls on Linux in order to collect data provenance. There are several existing provenance systems that observe system calls, but they have limitations regarding security, efficiency, and usability. Progger 3 remedies many of these limitations. As a result, Progger 3 is a working implementation of a provenance system that can observe any system call, guarantee tamper-proof provenance collection as long as the kernel on the client is not compromised, and transfer the provenance to other systems with confidentiality and integrity, all with a relatively low performance overhead. | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | |
dc.publisher | The University of Waikato | |
dc.rights | All items in Research Commons are provided for private study and research purposes and are protected by copyright with all rights reserved unless otherwise indicated. | |
dc.subject | Progger | |
dc.subject | Linux | |
dc.subject | TPM | |
dc.subject | Provenance | |
dc.subject | Security | |
dc.subject | Kernel | |
dc.subject | Cryptography | |
dc.subject | System call | |
dc.subject | Tracing | |
dc.subject.lcsh | Computer security | |
dc.subject.lcsh | Computer networks -- Security measures | |
dc.subject.lcsh | Linux device drivers (Computer programs) | |
dc.subject.lcsh | Operating systems (Computers) | |
dc.subject.lcsh | Malware (Computer software) -- Prevention | |
dc.subject.lcsh | Electronic data processing -- Security measures | |
dc.subject.lcsh | Data protection | |
dc.subject.lcsh | Computer viruses -- Prevention | |
dc.subject.lcsh | Computers -- Access control | |
dc.subject.lcsh | Kernel functions | |
dc.subject.lcsh | Computer network protocols | |
dc.title | Progger 3: A low-overhead, tamper-proof provenance system | |
dc.type | Thesis | |
thesis.degree.grantor | The University of Waikato | |
thesis.degree.level | Masters | |
thesis.degree.name | Master of Cyber Security (MCS) | |
dc.date.updated | 2021-04-28T04:05:35Z | |
pubs.place-of-publication | Hamilton, New Zealand | en_NZ |