Using instruction code obfuscation to defeat malware attacks
dc.contributor.advisor | Chairperson, Graduate Committee: Brock LaMeres | en |
dc.contributor.author | Running Crane, Tristan Tanner | en |
dc.date.accessioned | 2024-12-18T21:56:07Z | |
dc.date.issued | 2023 | en |
dc.description.abstract | This thesis investigates the use of obfuscated instruction codes within a redundant, RISC-V computer architecture to detect and defeat malware injected cyberattacks. The system abstracts the obfuscation from the user so that the system looks like a single processor edge computer. The system was tested using real-time sensor data coming from a camera while image processing algorithms were performed. The results of this thesis contribute to the body of knowledge on how to keep edge computers used in critical applications operational during a cyber attack. | en |
dc.identifier.uri | https://scholarworks.montana.edu/handle/1/18938 | |
dc.language.iso | en | en |
dc.publisher | Montana State University - Bozeman, College of Engineering | en |
dc.rights.holder | Copyright 2023 by Tristan Tanner Running Crane | en |
dc.subject.lcsh | Computer security | en |
dc.subject.lcsh | Malware (Computer software) | en |
dc.subject.lcsh | Heterogeneous computing | en |
dc.title | Using instruction code obfuscation to defeat malware attacks | en |
dc.type | Thesis | en |
mus.data.thumbpage | 15 | en |
thesis.degree.committeemembers | Members, Graduate Committee: Randal Larimer; Ross K. Snider | en |
thesis.degree.department | Electrical & Computer Engineering. | en |
thesis.degree.genre | Thesis | en |
thesis.degree.name | MS | en |
thesis.format.extentfirstpage | 1 | en |
thesis.format.extentlastpage | 66 | en |