Back close

Backdoor Analysis of Enterprise Applications

Backdoor Analysis of Enterprise Applications

Malware forms the basis of most cyber-criminal operations causing significant financial loss and posing a huge threat to the security of an organization. Enterprise applications form the backbone of any organization. They have scaled and matured over the years providing more and more services to users. However, the threats that have plagued it has also abounded.The goal of this research is to exhaustively study the problem of backdoors as is seen in software today, to identify the various possible attack vectors, and to develop a scalable and modular framework to detect backdoors in Common Off the Shelf (COTS) software and enterprise applications alike. The framework applies known program analysis techniques such as static and dynamic analysis and uses standard data flow and control flow constructs to study the flow of information in a program to conclude for backdoors.

Related Projects

Theoretical and Empirical Investigations on the Interaction of Asymmetric Migration and Intrinsic Growth Rate on the Dynamics of Laboratory Metapopulations of Drosophila Melanogaster
Theoretical and Empirical Investigations on the Interaction of Asymmetric Migration and Intrinsic Growth Rate on the Dynamics of Laboratory Metapopulations of Drosophila Melanogaster
Tabletop Technology for Collaborative Learning
Tabletop Technology for Collaborative Learning
Ribotyping of Fish Microflora
Ribotyping of Fish Microflora
AgriTech Precision
AgriTech Precision
Online Monitoring for Geological CO2 Storage and Leakage Based on Wireless Sensor Networks
Online Monitoring for Geological CO2 Storage and Leakage Based on Wireless Sensor Networks
Admissions Apply Now