Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where James H. Hamlyn-Harris is active.

Publication


Featured researches published by James H. Hamlyn-Harris.


network and system security | 2011

CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model

Amani S. Ibrahim; James H. Hamlyn-Harris; John C. Grundy; Mohamed Almorsy

The Infrastructure-as-a-Service (IaaS) cloud computing model has become a compelling computing solution with a proven ability to reduce costs and improve resource efficiency. Virtualization has a key role in supporting the IaaS model. However, virtualization also makes it a target for potent rootkits because of the loss of control problem over the hosted Virtual Machines (VMs). This makes traditional in-guest security solutions, relying on operating system kernel trustworthiness, no longer an effective solution to secure the virtual infrastructure of the IaaS model. In this paper, we explore briefly the security problem of the IaaS cloud computing model, and present CloudSec, a new virtualization-aware monitoring appliance that provides active, transparent and real-time security monitoring for hosted VMs in the IaaS model. CloudSec utilizes virtual machine introspection techniques to provide fine-grained inspection of VMs physical memory without installing any monitoring code inside the VM. It actively reconstructs and monitors the dynamically changing kernel data structures instances, as a prior step to enable providing protection for kernel data structures. We have implemented a proof-of-concept prototype using VMsafe libraries on a VMware ESX platform. We have evaluated the system monitoring accuracy and the performance overhead of CloudSec.


network and system security | 2012

Operating system kernel data disambiguation to support security analysis

Amani S. Ibrahim; John C. Grundy; James H. Hamlyn-Harris; Mohamed Almorsy

It is very challenging to verify the integrity of Operating System (OS) kernel data because of its complex layout. In this paper, we address the problem of systematically generating an accurate kernel data definition for OSes without any prior knowledge of the OS kernel data. This definition accurately reflects the kernel data layout by resolving the pointer-based relations ambiguities between kernel data, in order to support systemic kernel data integrity checking. We generate this definition by performing static points-to analysis on the kernels source code. We have designed a new points-to analysis algorithm and have implemented a prototype of our system. We have performed several experiments with real-world applications and OSes to prove the scalability and effectiveness of our approach for OS security applications.


automated software engineering | 2012

Supporting operating system kernel data disambiguation using points-to analysis

Amani S. Ibrahim; John C. Grundy; James H. Hamlyn-Harris; Mohamed Almorsy

Generic pointers scattered around operating system (OS) kernels make the kernel data layout ambiguous. This limits current kernel integrity checking research to covering a small fraction of kernel data. Hence, there is a great need to obtain an accurate kernel data definition that resolves generic pointer ambiguities, in order to formulate a set of constraints between structures to support precise integrity checking. In this paper, we present KDD, a new tool for systematically generating a sound kernel data definition for any C-based OS e.g. Windows and Linux, without any prior knowledge of the kernel data layout. KDD performs static points-to analysis on the kernels source code to infer the appropriate candidate types for generic pointers. We implemented a prototype of KDD and evaluated it to prove its scalability and effectiveness.


network and system security | 2012

Identifying OS kernel objects for run-time security analysis

Amani S. Ibrahim; James H. Hamlyn-Harris; John C. Grundy; Mohamed Almorsy

In operating systems, we usually refer to a running instance of a data structure (data type) as an object. Locating dynamic runtime kernel objects in physical memory is the most difficult step towards enabling implementation of robust operating system security solutions. In this paper, we address the problem of systemically uncovering all operating system dynamic kernel runtime objects, without any prior knowledge of the operating system kernel data layout in memory. We present a new hybrid approach - called DIGGER - that uncovers kernel runtime objects with nearly complete coverage, high accuracy and robust results. The information revealed allows detection of generic pointer exploits and data hooks. We have implemented a prototype of DIGGER and conducted an evaluation of its efficiency and effectiveness. To demonstrate our approachs potential, we have also developed three different proof-of-concept operating system security tools based on the DIGGER approach.


asia pacific software engineering conference | 2010

Emerging Security Challenges of Cloud Virtual Infrastructure

Amani S. Ibrahim; James H. Hamlyn-Harris; John C. Grundy


conference on information technology education | 2006

Predictors of Team Work Satisfaction

James H. Hamlyn-Harris; Barbara J. Hurst; Karola von Baggo; Anthony J. Bayley


international conference on cloud computing | 2012

Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap

Amani S. Ibrahim; James H. Hamlyn-Harris; John C. Grundy; Mohamed Almorsy


Archive | 2013

DIGGER: Identifying OS Kernel Objects for Run- time Security Analysis

Amani S. Ibrahim; James H. Hamlyn-Harris; John C. Grundy; Mohamed Almorsy


International journal on internet and distributed computing systems | 2013

DIGGER: identifying OS dynamic kernel objects for run-time security analysis

Amani S. Ibrahim; James H. Hamlyn-Harris; John C. Grundy; Mohamed Almorsy


International Journal on Internet and Distributed Computing Systems | 2013

DIGGER: identifying operating system dynamic kernel objects for run-time security analysis

Amani S. Ibrahim; James H. Hamlyn-Harris; John C. Grundy; Mohamed Almorsy

Collaboration


Dive into the James H. Hamlyn-Harris's collaboration.

Top Co-Authors

Avatar

Amani S. Ibrahim

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohamed Almorsy

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Anthony J. Bayley

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Barbara J. Hurst

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Karola von Baggo

Swinburne University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge