Comparing Different Moving Target Defense Techniques
暂无分享,去创建一个
Minghui Zhu | Peng Liu | Pinyao Guo | Jun Xu | Mingyi Zhao | Robert F. Erbacher | Minghui Zhu | Pinyao Guo | Jun Xu | Mingyi Zhao | R. Erbacher | Peng Liu
[1] Liming Chen,et al. N-VERSION PROGRAMMINC: A FAULT-TOLERANCE APPROACH TO RELlABlLlTY OF SOFTWARE OPERATlON , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..
[2] Michael Sipser,et al. Introduction to the Theory of Computation , 1996, SIGA.
[3] Dawn Song,et al. Mitigating buffer overflows by operating system randomization , 2002 .
[4] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[5] Angelos D. Keromytis,et al. SQLrand: Preventing SQL Injection Attacks , 2004, ACNS.
[6] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[7] Nathanael Paul,et al. Where's the FEEB? The Effectiveness of Instruction Set Randomization , 2005, USENIX Security Symposium.
[8] Martin C. Rinard. Probabilistic accuracy bounds for fault-tolerant computations that discard tasks , 2006, ICS '06.
[9] Helen J. Wang,et al. RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).
[10] Martin C. Rinard,et al. Living in the comfort zone , 2007, OOPSLA.
[11] Martin C. Rinard. Using early phase termination to eliminate load imbalances at barrier synchronization points , 2007, OOPSLA.
[12] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[13] Leslie Lamport. Computation and State Machines , 2008 .
[14] Arun K. Sood,et al. Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) , 2009, 2009 Second International Conference on Dependability.
[15] Vincent Nicomette,et al. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers , 2009, IEEE Transactions on Dependable and Secure Computing.
[16] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[17] Sahin Albayrak,et al. Application-level Simulation for Network Security , 2010, Simul..
[18] Ehab Al-Shaer,et al. Toward Network Configuration Randomization for Moving Target Defense , 2011, Moving Target Defense.
[19] Somesh Jha,et al. End-to-End Software Diversification of Internet Services , 2011, Moving Target Defense.
[20] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[21] Martin C. Rinard. Manipulating Program Functionality to Eliminate Security Vulnerabilities , 2011, Moving Target Defense.
[22] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[23] Michael B. Crouse,et al. A moving target environment for computer configurations using Genetic Algorithms , 2011, 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG).
[24] Michael Franz,et al. Compiler-Generated Software Diversity , 2011, Moving Target Defense.
[25] Hamed Okhravi,et al. Creating a cyber moving target for critical infrastructure applications using platform diversity , 2012, Int. J. Crit. Infrastructure Prot..
[26] Peng Liu,et al. Assessing the Trustworthiness of Drivers , 2012, RAID.
[27] Scott A. DeLoach,et al. Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense | NIST , 2012 .
[28] William W. Streilein,et al. Finding Focus in the Blur of Moving-Target Techniques , 2014, IEEE Security & Privacy.
[29] Kevin M. Carter,et al. Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism , 2014, RAID.
[30] Herbert Bos,et al. Research in Attacks, Intrusions, and Defenses , 2015, Lecture Notes in Computer Science.