Finding Focus in the Blur of Moving-Target Techniques
暂无分享,去创建一个
William W. Streilein | Hamed Okhravi | Thomas Hobson | David Bigelow | H. Okhravi | W. Streilein | David Bigelow | Thomas Hobson | Hamed Okhravi
[1] Paul Ammann,et al. Data Diversity: An Approach to Software Fault Tolerance , 1988, IEEE Trans. Computers.
[2] D. Kewley,et al. Dynamic approaches to thwart adversary intelligence gathering , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[3] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[4] Jun Li,et al. Resilient self-organizing overlay networks for security update delivery , 2004, IEEE Journal on Selected Areas in Communications.
[5] David Evans,et al. N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.
[6] Yih Huang,et al. Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.
[7] Michael Franz,et al. Runtime Defense against Code Injection Attacks Using Replicated Execution , 2011, IEEE Transactions on Dependable and Secure Computing.
[8] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[9] Jeffrey M. Bradshaw,et al. Command and Control Requirements for Moving-Target Defense , 2012, IEEE Intelligent Systems.
[10] Claire Le Goues,et al. GenProg: A Generic Method for Automatic Software Repair , 2012, IEEE Transactions on Software Engineering.
[11] Hamed Okhravi,et al. Creating a cyber moving target for critical infrastructure applications using platform diversity , 2012, Int. J. Crit. Infrastructure Prot..
[12] Sushil Jajodia,et al. Moving Target Defense II: Application of Game Theory and Adversarial Modeling , 2012 .
[13] Michael Franz,et al. Reverse Stack Execution in a MultiVariant Execution Environment , 2012 .
[14] Richard Colbaugh,et al. Predictability-oriented defense against adaptive adversaries , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[15] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.