Skip to content

Commit 8b7f397

Browse files
committed
Commit and publish final and printed version of dissertation.
0 parents  commit 8b7f397

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+26389
-0
lines changed

.gitignore

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
*.aux
2+
*.log
3+
*.bbl
4+
*.blg
5+
*.d
6+
*.fls
7+
*.make
8+
*.temp
9+
*.out
10+
*.cut
11+
*.toc
12+
*.xml
13+
*.cookie
14+
*.bcf
15+
16+
main-blx.bib
17+
18+
# vim
19+
*.swp
20+
21+
# mac
22+
.DS_Store
23+
24+
*.pdf
25+
!figures/*.pdf
26+
!linus_dissertation_final.pdf
27+
28+
*-eps-converted-to.pdf

Makefile

Lines changed: 4269 additions & 0 deletions
Large diffs are not rendered by default.

README.md

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Linus Karlsson's PhD dissertation
2+
3+
This repository contains the TeX sources for my dissertation.
4+
The sources should be compiled with LuaLaTeX and Biber.
5+
6+
To compile the dissertation from source, you also need the fonts Adobe Garamond Pro and Frutiger LT Std.
7+
These are the profile fonts of Lund University, so if you are affiliated with the university you can [download them here](https://www.staff.lu.se/support-and-tools/communication-and-graphic-profile/download-templates-and-communication-tools).
8+
Otherwise, you can change the fonts in the source of `main.tex`, near the top.
9+
10+
Tools and packages used:
11+
12+
* LuaLaTeX.
13+
* TikZ for graphics.
14+
* Chris Monson's [Latex Makefile](https://github.com/shiblon/latex-makefile).
15+
* XeLaTeX (to compile the datasheet in the `datasheet/` directory, if you wish to use it)
16+
17+
Inspired by Jesper Öqvist's thesis which can be found at https://github.com/llbit/joqvist-thesis
18+
19+
## Final dissertation as PDF
20+
21+
If you just want to see the dissertation in its final form, just open the file `linus_dissertation_final.pdf` in this repo, or [click here](https://linuskarlsson.se/papers/linus_dissertation_final.pdf) to view it from my personal web page.
22+
23+
## Compile dissertation from source
24+
25+
Run `make` from the root of this repository. Note that for successful compilation, you will need the fonts installed as described above.
26+
27+
To compile the datasheet, enter the `datasheet/` directory and run `xelatex datasheet.tex`

Variables.ini

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
BUILD_STRATEGY := pdflatex
2+
BIBTEX := biber
3+
PDFLATEX := lualatex
4+
5+
onlysources.tex=main.tex
6+
7+
.PHONY: thesis errata
8+
9+
thesis: main.tex
10+
make main.pdf
11+
cp main.pdf thesis.pdf
12+
13+
errata: errata.tex
14+
make errata.pdf

abstract.tex

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
Organizations and individuals maintain and use an ever increasing amount of computer systems, either deployed locally, or in the cloud.
2+
These systems often store and handle vast amounts of data, some of which is sensitive and should be kept private.
3+
Regardless of where the data is located, there is a need to prevent data from falling into the wrong hands.
4+
To this end, this dissertation presents contributions to preventive measures in cyber security.
5+
6+
Trusted computing can be used to attest the integrity of code running on a remote computer, and to store data securely using secure storage, for example in a cloud setting.
7+
This dissertation presents contributions regarding the use of the Trusted Platform Module (TPM) in high-availability systems, both for TPM 1.2 and TPM 2.0.
8+
It also discusses migration of keys from TPM 1.2 to the backwards-incompatible TPM 2.0, while maintaining the same behaviour with regard to authorization mechanisms.
9+
Contributions also include the use of trusted computing to attest the integrity of network elements before they are enrolled into a Software Defined Network, as well as protecting important assets of such network elements by using isolated execution environments.
10+
11+
In the field of cryptography, the dissertation contains contributions regarding the Maximum Degree Monomial (MDM) test, which is related to the construction of distinguishers and nonrandomness detectors.
12+
A new generalized algorithm to find subsets for the MDM test is presented, together with evaluations of the algorithm on several different stream ciphers.
13+
14+
The dissertation also contains contributions in the field of vulnerability assessment using recommender systems.
15+
First, a recommender system for user-specific vulnerability scoring is presented, which scores vulnerabilities based on implicit and explicit user preferences, together with domain-based information unique to the field of vulnerability assessment.
16+
Finally, the dissertation also contains contributions regarding privacy of such recommender systems, by protecting the privacy of user preferences even from the provider of the recommender service.

acknowledgements.tex

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
2+
% First talk about supervisors
3+
I want to start this section by thanking my main supervisor, Martin Hell.
4+
During my PhD, he has always provided great guidance -- helpful, clear, and concise.
5+
His door has always been open, and he has always been willing to provide help.
6+
After our discussions, I have always left his office feeling encouraged, hopeful, and with a clear idea of how to proceed.
7+
Not only does he possess the skills of a good supervisor, he is also a great friend and I have enjoyed having my office next door to him during my years at the university.
8+
9+
I also wish to thank my assistant supervisor Paul Stankovski Wagner for his help during my research, and for being another great office neighbour.
10+
In addition to the perks of having friendly neighbours in general, having my office squeezed in between Martin's and Paul's offices ensured that I did not arrive \emph{too} late in the mornings -- in fear of their witty comments about my working hours.
11+
I also want to express my thanks to my other assistant supervisor Ben Smeets for his valuable research input, in particular related to trusted computing.
12+
Finally, I wish to thank Thomas Johansson for actually suggesting me to pursue a PhD.
13+
14+
During my time at the department, I have got to know many colleagues, particularly in the Crypto and Security group.
15+
First of all I wish to thank Jonathan and Erik for all our geeky discussions:
16+
Jonathan for our random technical discussions about everything from the strict aliasing rule to thick microcontroller manuals,
17+
and Erik for his random math-related monologues in my office, which I have to admit I enjoy, even though he after several years still involuntarily sabotages my office door every time he visits.
18+
I also wish to thank Pegah for giving me a worthy competitor in bringing home-baked Thursday fika, Alexander for interesting server management discussions, Nicolae for our research collaboration both at RISE and the university, and finally Carl for significantly increasing my vitamin~D production by forcing me to eat lunch outside.
19+
During my time as a PhD student, the research group has grown significantly, so instead of trying to name all current and past members, I just wish to say that it has been a pleasure to get to know all of you, and sharing a great environment for research and small-talk.
20+
21+
% tech. and admin. staff
22+
I also want to thank the administrative and technical staff at the department for helping me during my time at the department.
23+
A special thanks to Erik Jonsson for interesting discussions, and patiently handling all my requests for opening firewall ports, leaving the department's firewall with more holes than a Swiss cheese.
24+
25+
% Finally friends and family
26+
Finally, I also wish to thank my friends and family, you have all helped and supported me during my PhD studies.
27+
In particular, I want to mention all inspiring code evenings with Alex, weekly Thursday lunches with Paul, and daily Slack competitions with Henrik.
28+
To my mom Carina, and my dad Håkan: thank you for all your love and support throughout my life, and for always being there when I need you.
29+
30+
% Signature.
31+
\begin{flushright}
32+
\emph{Linus}
33+
34+
Lund, September 2019
35+
\end{flushright}

contribution-statement.tex

Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
The following papers are included in this dissertation:
2+
3+
\begin{description}
4+
\item[Paper~I]
5+
\paperIref
6+
\item[Paper~II]
7+
\paperIIref
8+
\item[Paper~III]
9+
\paperIIIref
10+
\item[Paper~IV]
11+
\paperIVref
12+
13+
This dissertation contains the full version of this paper, with extended descriptions and motivations of the recommender and its parameters.
14+
\item[Paper~V]
15+
\paperVref
16+
\item[Paper~VI]
17+
\paperVIref
18+
\end{description}
19+
20+
\newpage
21+
\noindent
22+
The table below summarizes the responsibilities Linus Karlsson had in each paper:
23+
24+
\vspace{1em}
25+
\begin{center}
26+
\begin{tabular}{lllll}
27+
\toprule
28+
\emph{Paper} & \emph{Writing} & \emph{Concepts} & \emph{Implementation} & \emph{Evaluation} \\
29+
\midrule
30+
\textbf{I} & yes & yes & YES & -- \\
31+
\textbf{II} & YES & YES & YES & -- \\
32+
\textbf{III} & yes & partial & yes & yes \\
33+
\textbf{IV} & YES & yes & YES & yes \\
34+
\textbf{V} & yes & yes & YES & YES \\
35+
\textbf{VI} & YES & partial & YES & YES \\
36+
\bottomrule
37+
\end{tabular}
38+
\end{center}
39+
\vspace{1em}
40+
41+
\noindent
42+
Capital letters indicate roles where Linus Karlsson took primary responsibility for the given role.
43+
The individual contributions of Linus are described in more detail in the following paragraphs.
44+
45+
In Paper~I, Linus was involved in writing and concept design.
46+
Linus solely constructed the implementation to test the proposed concept.
47+
48+
In Paper~II, Linus had the main responsibility for both writing and designing the proposed solution.
49+
He also solely constructed the implementation to verify the solution.
50+
51+
In Paper~III, Linus was responsible for writing the sections about trust anchors in general, and everything related to the application plane.
52+
% Sections~\ref{subsec:trust-anchors}, \ref{subsec:application-plane-trust}, \ref{subsec:trustanchors:appplane}, \ref{subsec:application-evaluation}.
53+
He was partially responsible for the concepts in the paper: those related to the application plane.
54+
Linus was also responsible for the implementation and performance evaluation of the application plane network element enrollment.
55+
56+
In Paper~IV, Linus was responsible for writing all of the system model and implementation sections.
57+
Together with the other authors, he defined the overall goals of the recommender, and was then responsible for the detailed design of the system.
58+
He was solely responsible for the implementation of the system.
59+
60+
In Paper~V, Linus was responsible for writing the sections about privacy profiles, isolated execution, implementation, and evaluation.
61+
Together with the other authors, he defined the proposed privacy-preserving solution.
62+
He was solely responsible for the implementation and evaluation of the solution.
63+
64+
In Paper~VI, Linus was the main responsible for writing of the complete paper.
65+
He was partially involved in the design of the proposed algorithm.
66+
Linus was solely responsible for the implementation of the newly proposed algorithms, as well as the evaluation of the results.
67+
68+
A further description of the papers' contributions \emph{to the research field} is presented in Section~\ref{sec:kappa-contributions}.
69+
70+
\newpage
71+
\subsection*{Other Contributions}
72+
73+
The following peer-reviewed publications have also been published during my PhD studies, but are not included in this dissertation.
74+
75+
\begin{itemize}
76+
\item Christopher Jämthagen, Linus Karlsson, Paul Stankovski, and Martin Hell: ``eavesROP: Listening for ROP Payloads in Data Streams''. In \emph{Information Security Conference, ISC 2014, Hong Kong}, LNCS Vol. 8783, pp. 413--424, Springer.
77+
\item Linus Karlsson, Martin Hell, and Paul Stankovski. ``Improved Greedy Nonrandomness Detectors for Stream Ciphers''. In \emph{3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal}. pp. 225--232, SCITEPRESS.
78+
\item Nicolae Paladi and Linus Karlsson. ``Safeguarding VNF Credentials with Intel SGX''. In \emph{SIGCOMM Posters and Demos '17, Los Angeles, CA, USA}. ACM.
79+
\item Alexander Cobleigh, Martin Hell, Linus Karlsson, Oscar Reimer, Jonathan Sönnerup, and Daniel Wisenhoff. ``Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code''. In \emph{2018 IEEE 22nd International Enterprise Distributed Object Computing Workshop (EDOCW), Stockholm, Sweden}. pp. 208-211, IEEE.
80+
\end{itemize}
81+
82+
83+
%N. Paladi, L. Karlsson, K. Elbashir: “Trust Anchors in Software Defined Networks”. ESORICS 2018, Barcelona, Spain, LNCS Vol. 11009, pp. 485–504, Springer. DOI: 10.1007/978-3-319-98989-1_24
84+
%[PDF]
85+
%
86+
%
87+
%L. Karlsson, M. Hell, P. Stankovski: “Not So Greedy: Enhanced Subset Exploration for Nonrandomness Detectors”. Information Systems Security and Privacy. ICISSP 2017, Revised Selected Papers, CCIS Vol. 867, pp. 273–294, Springer. DOI: 10.1007/978-3-319-93354-2_13
88+
%[PDF]
89+
%
90+
%L. Karlsson, M. Hell: “Enabling Key Migration Between Non-Compatible TPM Versions”. Trust and Trustworthy Computing, TRUST 2016, Vienna, Austria, LNCS Vol. 9824, pp. 101–118, Springer. DOI: 10.1007/978-3-319-45572-3_6
91+
%[PDF]
92+
%
93+
%M. Hell, L. Karlsson, B. Smeets, J. Mirosavljevic: “Using TPM Secure Storage in Trusted High Availability Systems”. The 6th International Conference on Trusted Systems, INTRUST 2014, Beijing, China, LNCS Vol. 9473, pp. 243–258, Springer. DOI: 10.1007/978-3-319-27998-5_16
94+
%[PDF]
95+
%
96+
97+
98+
99+
%L. Karlsson, M. Hell, P. Stankovski: “Improved Greedy Nonrandomness Detectors for Stream Ciphers”. 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, pp. 225–232, SCITEPRESS. DOI: 10.5220/0006268202250232
100+
%[PDF]
101+
%
102+
%N. Paladi, L. Karlsson: “Safeguarding VNF Credentials with Intel SGX”. SIGCOMM Posters and Demos ’17, Los Angeles, CA, USA, ACM. DOI: 10.1145/3123878.3132016
103+
%
104+
%A. Cobleigh, M. Hell, L. Karlsson, O. Reimer, J. Sönnerup, D. Wisenhoff: “Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code”. IEEE EDOCW 2018, Stockholm, Sweden, pp. 208–211, IEEE. DOI: 10.1109/EDOCW.2018.00038
105+
106+
107+
108+
109+
% C. Jämthagen, L. Karlsson, P. Stankovski, M. Hell: “eavesROP: Listening for ROP Payloads in Data Streams”. Information Security Conference, ISC 2014, Hong Kong, LNCS Vol. 8783, pp. 413–424, Springer. DOI: 10.1007/978-3-319-13257-0_25
110+
% [PDF]

0 commit comments

Comments
 (0)