Using instruction code obfuscation to defeat malware attacks

dc.contributor.advisorChairperson, Graduate Committee: Brock LaMeresen
dc.contributor.authorRunning Crane, Tristan Tanneren
dc.date.accessioned2024-12-18T21:56:07Z
dc.date.issued2023en
dc.description.abstractThis thesis investigates the use of obfuscated instruction codes within a redundant, RISC-V computer architecture to detect and defeat malware injected cyberattacks. The system abstracts the obfuscation from the user so that the system looks like a single processor edge computer. The system was tested using real-time sensor data coming from a camera while image processing algorithms were performed. The results of this thesis contribute to the body of knowledge on how to keep edge computers used in critical applications operational during a cyber attack.en
dc.identifier.urihttps://scholarworks.montana.edu/handle/1/18938
dc.language.isoenen
dc.publisherMontana State University - Bozeman, College of Engineeringen
dc.rights.holderCopyright 2023 by Tristan Tanner Running Craneen
dc.subject.lcshComputer securityen
dc.subject.lcshMalware (Computer software)en
dc.subject.lcshHeterogeneous computingen
dc.titleUsing instruction code obfuscation to defeat malware attacksen
dc.typeThesisen
mus.data.thumbpage15en
thesis.degree.committeemembersMembers, Graduate Committee: Randal Larimer; Ross K. Snideren
thesis.degree.departmentElectrical & Computer Engineering.en
thesis.degree.genreThesisen
thesis.degree.nameMSen
thesis.format.extentfirstpage1en
thesis.format.extentlastpage66en

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
running-crane-using-2023.pdf
Size:
22.96 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
825 B
Format:
Plain Text
Description:
Copyright (c) 2002-2022, LYRASIS. All rights reserved.