Skip to Main Content
Frequently Asked Questions
Submit an ETD
Global Search Box
Need Help?
Keyword Search
Participating Institutions
Advanced Search
School Logo
Files
File List
muhonors1111148755.pdf (153.65 KB)
ETD Abstract Container
Abstract Header
The Integrity Enforcer: Ensuring Program Data and Code Security
Author Info
Hock, Kevin
Permalink:
http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1111148755
Abstract Details
Year and Degree
2003, Bachelor of Science in Business, Miami University, School of Business Administration - Accountancy.
Abstract
Ensuring operational integrity of program code and data would make it virtually impossible for a program to be corrupted, either by a malicious party or through a software or hardware failure, without detection. The Integrity Enforcer is a way to provide this high level of assurance, and the Enforcer can be automatically added to any existing program, by recompiling that program's existing code using the Enforcer Builder. Further, the Enforcer is able to provide this protection, which can even be adjusted to provide an ideal balance of security, with minimal performance degradation with respect to execution time and memory usage. Several real-world examples are shown where the use of the Integrity Enforcer would have prevented large security holes, one so large that the CERT was involved and hundreds of applications needed repair. We present a detailed discussion of the criteria used to evaluate the Integrity Enforcer, along with a discussion of the inner workings of the Integrity Enforcer, which is the element of our solution that automatically adds the Enforcer to any program with a simple recompile. The construction of an Enforcer Builder is also discussed, including the issues that would have to be addressed in order to build a complete Enforcer Builder. Several limitations of the Integrity Enforcer are also discussed, along with the future work that can be done for both the Builder and the Enforcer.
Committee
Ann Sobel (Advisor)
Subject Headings
Business Administration, Accounting
Recommended Citations
Refworks
EndNote
RIS
Mendeley
Citations
Hock, K. (2003).
The Integrity Enforcer: Ensuring Program Data and Code Security
[Undergraduate thesis, Miami University]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1111148755
APA Style (7th edition)
Hock, Kevin.
The Integrity Enforcer: Ensuring Program Data and Code Security.
2003. Miami University, Undergraduate thesis.
OhioLINK Electronic Theses and Dissertations Center
, http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1111148755.
MLA Style (8th edition)
Hock, Kevin. "The Integrity Enforcer: Ensuring Program Data and Code Security." Undergraduate thesis, Miami University, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=muhonors1111148755
Chicago Manual of Style (17th edition)
Abstract Footer
Document number:
muhonors1111148755
Download Count:
401
Copyright Info
© 2003, all rights reserved.
This open access ETD is published by Miami University Honors Theses and OhioLINK.
Release 3.2.12