完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Wang, Ping | en_US |
dc.contributor.author | Chao, Wun Jie | en_US |
dc.contributor.author | Chao, Kuo-Ming | en_US |
dc.contributor.author | Lo, Chi-Chun | en_US |
dc.date.accessioned | 2016-03-28T00:05:45Z | - |
dc.date.available | 2016-03-28T00:05:45Z | - |
dc.date.issued | 2014-01-01 | en_US |
dc.identifier.isbn | 978-1-4799-6563-2 | en_US |
dc.identifier.issn | en_US | |
dc.identifier.uri | http://dx.doi.org/10.1109/ICEBE.2014.40 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/129836 | - |
dc.description.abstract | Most existing approaches to developing cloud applications using threat analysis involve program vulnerability analyses for identifying the security holes associated with malware attacks. New malware attacks can bypass firewall-based detection by bypassing stack protection and by using Hypertext Transfer Protocol logging, kernel hacks, and library hack techniques, and to the cloud applications. In performing threat analysis for unspecified malware attacks, software engineers can use a taint analysis technique for tracking information flows between attack sources (malware) and detect vulnerabilities of targeted network applications. This paper proposes a threat risk analysis model incorporating an improved attack tree analysis scheme for solving the mobile security problem; in the model, Android programs perform taint checking to analyse the risks posed by suspicious applications. In probabilistic risk analysis, defence evaluation metrics are used for each attack path for assisting a defender simulate the attack results against malware attacks and estimate the impact losses. Finally, a case of threat analysis of a typical cyber security attack is presented to demonstrate the proposed approach. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Cyber attacks | en_US |
dc.subject | Threat | en_US |
dc.subject | analysis | en_US |
dc.subject | Taint checking | en_US |
dc.subject | Attack defence tree | en_US |
dc.title | Using Taint Analysis for Threat Risk of Cloud Applications | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.doi | 10.1109/ICEBE.2014.40 | en_US |
dc.identifier.journal | 2014 IEEE 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE) | en_US |
dc.citation.spage | 185 | en_US |
dc.citation.epage | 190 | en_US |
dc.contributor.department | 資訊管理與財務金融系 註:原資管所+財金所 | zh_TW |
dc.contributor.department | Department of Information Management and Finance | en_US |
dc.identifier.wosnumber | WOS:000364094600028 | en_US |
dc.citation.woscount | 0 | en_US |
顯示於類別: | 會議論文 |