<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>OAR@UM Collection:</title>
    <link>https://www.um.edu.mt/library/oar/handle/123456789/21961</link>
    <description />
    <pubDate>Wed, 22 Apr 2026 08:11:10 GMT</pubDate>
    <dc:date>2026-04-22T08:11:10Z</dc:date>
    <item>
      <title>Enhancing android malware sandboxes with anti-evasion code patching</title>
      <link>https://www.um.edu.mt/library/oar/handle/123456789/30050</link>
      <description>Title: Enhancing android malware sandboxes with anti-evasion code patching
Abstract: Sophisticated Android malware families often implement techniques aimed at avoiding detection. Split personality malware for example, behaves benignly when it&#xD;
detects that it is running on an analysis environment such as a malware sandbox,&#xD;
and maliciously when running on a real user's device. These kind of techniques&#xD;
are problematic for malware analysts, often rendering them unable to detect or&#xD;
understand the malicious behaviour. This is where sandbox hardening comes into&#xD;
play. In this work, we exploit sandbox detection heuristic prediction to proactively&#xD;
generate bytecode patches, in order to disable the malware's ability to detect a&#xD;
malware sandbox. Through the development of AndroNeo, we demonstrate the&#xD;
feasibility of this approach by showing that the heuristic prediction basis is a solid&#xD;
starting point to build upon, and demonstrating that when heuristic prediction&#xD;
is followed by bytecode patch generation, split personality can be defeated. The&#xD;
AndroNeo prototype implements checks at the Java level for API method calls&#xD;
that can distinguish real devices from emulators. The robustness of AndroNeo was&#xD;
demonstrated by showing its ability to identify and patch evasion heuristics within&#xD;
packed code. The relevance of packed malware was confirmed by demonstrating&#xD;
the prevalence of packers in modern day malware samples.
Description: M.SC.COMP.SCI.&amp;ARTIFICIAL INTELLIGENCE</description>
      <pubDate>Sun, 01 Jan 2017 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://www.um.edu.mt/library/oar/handle/123456789/30050</guid>
      <dc:date>2017-01-01T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Towards peer-to-peer caching techniques for web resources</title>
      <link>https://www.um.edu.mt/library/oar/handle/123456789/30049</link>
      <description>Title: Towards peer-to-peer caching techniques for web resources
Abstract: When dealing with web applications, response and loading time can often be&#xD;
prolonged due to many factors such as large amounts of content which need to&#xD;
be sent to the client and excessive load on the server which causes responses to&#xD;
be processed and sent in a slower manner. These reasons often lead to website&#xD;
operators having to invest in scaling up their systems so as to handle larger server&#xD;
loads. Another strategy used to decrease server load is that of caching resources&#xD;
within clients' browsers in anticipation of future re-usability. Once a resource&#xD;
is cached, it is accessible only by the client at which it is cached yet it is a&#xD;
common occurrence that a group of clients require the same web resource. The&#xD;
idea of sharing cached resources between clients which are likely to access the same&#xD;
resources would make sense as it would further decrease server load, yet as standard&#xD;
implementations go, browsers do not currently have a way to share cached resources&#xD;
between them. With the recent introduction of browser-to-browser communication&#xD;
protocols which allow browsers to communicate directly with each other, the&#xD;
sharing of cached resources directly between clients has become a possibility. This&#xD;
dissertation explores the use of browser-to-browser communication to share cached&#xD;
web resources between a group of clients and more specifically, browsers. It also&#xD;
focuses on designing an approach which will allow website operators to incorporate&#xD;
a transparent content distribution network into their website so that website visitors&#xD;
will be able to share static web content between themselves in a peer-to-peer manner&#xD;
while reducing server loads.
Description: M.SC.COMPUTER SCIENCE</description>
      <pubDate>Sun, 01 Jan 2017 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://www.um.edu.mt/library/oar/handle/123456789/30049</guid>
      <dc:date>2017-01-01T00:00:00Z</dc:date>
    </item>
    <item>
      <title>A distributed pipeline for interactive physically based rendering</title>
      <link>https://www.um.edu.mt/library/oar/handle/123456789/30048</link>
      <description>Title: A distributed pipeline for interactive physically based rendering
Abstract: The synthesis of virtual environments using physically based approaches re-&#xD;
quires high-end machines, even for dynamic scenarios that are moderately complex&#xD;
in terms of geometry and illumination. The constraint of interactivity further&#xD;
compounds these requirements, especially when large output resolutions are taken&#xD;
into consideration. In order to democratise physically based rendering and make it&#xD;
available to a wide spectrum of devices, from mobile to tablet to desktop machines,&#xD;
a distributed graphics pipeline is proposed that enhances traditional GPU-based&#xD;
real-time graphics with the computational power of the Cloud.&#xD;
A prototype of the proposed pipeline is presented. In the fi rst stage of the&#xD;
implementation, the computation of indirect light within the global illumination&#xD;
rendering pipeline is relocated to a precomputation stage and merged with the&#xD;
direct light image at the post-processing stage. In this stage the computation is&#xD;
performed on the target machine itself. In the second stage, the computation of&#xD;
indirect light is moved to the Cloud and applied to static scenes. Finally, in the&#xD;
third stage, support is added for dynamic scenes, with experiments performed on&#xD;
moving lights.&#xD;
This study demonstrates that such a distributed pipeline is viable, with good&#xD;
quality images obtained at high frame rates on the client. The proposed pipeline&#xD;
also scales well when servicing multiple clients simultaneously.
Description: M.SC.COMPUTER SCIENCE</description>
      <pubDate>Sun, 01 Jan 2017 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://www.um.edu.mt/library/oar/handle/123456789/30048</guid>
      <dc:date>2017-01-01T00:00:00Z</dc:date>
    </item>
    <item>
      <title>Memory forensics of control flow integrity violations</title>
      <link>https://www.um.edu.mt/library/oar/handle/123456789/29983</link>
      <description>Title: Memory forensics of control flow integrity violations
Abstract: Incident response comprises of conducting digital investigation after a breach into&#xD;
a system occurs. Current tools which aid the incident responder in obtaining information&#xD;
on the attack are able to locate the payload of the attack such as a&#xD;
backdoor to the system, either by performing disk or memory forensics. However,&#xD;
current tools are not able to obtain artefacts related to the exploit i.e. the entrypoint&#xD;
to the system. This is due to the fact that disk forensic tools are only able&#xD;
to locate those artefacts which are persistent on disk. Memory forensics addresses&#xD;
the limitation of disk forensics as it aids the incident responder in locating artefacts&#xD;
which do not interact with the disk. However, such artefacts are recycled&#xD;
quickly out of memory especially in the case of script-based exploits since memory&#xD;
is volatile. Thus, memory snapshots need to be taken when some events occur and&#xD;
exploits are suspected, defined as MemDump points. If the exploit which violated&#xD;
the system is found, the system can be hardened so as to prevent future intrusions.&#xD;
The project aims to take an event-driven approach to memory forensics. Research&#xD;
proceeded into phases, the first part being conducting process memory analysis to&#xD;
locate the artefacts produced by state-of-the-art exploits and thus deduce a pattern&#xD;
of exploits at the memory level. Suitable MemDump points were defined based on&#xD;
the research conducted. The second phase was the definition of a framework Mem-&#xD;
CFI, which makes use of runtime instrumentation to inject the MemDump points&#xD;
in existing binaries in a way that minimal overhead is incurred and the MemDump&#xD;
points are tamper resistant. The framework was evaluated in terms of practicality&#xD;
and effectiveness. The practicality was evaluated by measuring the number of&#xD;
memory snapshots that are taken while browsing, the performance overhead which&#xD;
is induced and the size of the memory snapshots. The effectiveness of the proposed&#xD;
framework was shown through the use of different case studies which are representative&#xD;
of current attacks. The exploit was successfully located in memory in each&#xD;
case.
Description: M.SC.COMPUTER SCIENCE</description>
      <pubDate>Sun, 01 Jan 2017 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">https://www.um.edu.mt/library/oar/handle/123456789/29983</guid>
      <dc:date>2017-01-01T00:00:00Z</dc:date>
    </item>
  </channel>
</rss>

