Early experiments with software diversity in the mid 1970s investigated N-version programming and recovery blocks to increase the reliability of embedded systems. Four …
Code-reuse attacks such as return-oriented programming (ROP) pose a severe threat to modern software. Designing practical and effective defenses against code-reuse attacks is …
A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is presented, which is the first to efficiently resist code-reuse attacks launched by informed …
We explore software diversity as a defense against side-channel attacks by dynamically and systematically randomizing the control flow of programs. Existing software diversity …
Web applications are a critical component of the security ecosystem as they are often the front door for many companies, as such, vulnerabilities in web applications allow hackers …
A Homescu, T Jackson, S Crane… - … on Dependable and …, 2015 - ieeexplore.ieee.org
The software monoculture favors attackers over defenders, since it makes all target environments appear similar. Code-reuse attacks, for example, rely on target hosts running …
P Larsen, S Brunthaler, M Franz - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Vulnerabilities in low-level systems software leave users exposed to malware, theft, and monitoring. Automatic software diversity makes weaponization of these vulnerabilities much …
ZUSAMMENFASSUNG Laufzeitangriffe nutzen Speicher-und Programmierfehler aus, um beliebiges Schadverhalten auf einem Computersystem zu verursachen. Obwohl diese …
We call changeware software that surreptitiously modifies resources of software applications, eg, configuration files. Changeware is developed by malicious entities which …