Survey on cyberspace security

H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …

The multiple facets of software diversity: Recent developments in year 2000 and beyond

B Baudry, M Monperrus - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Early experiments with software diversity in the mid 1970s investigated N-version
programming and recovery blocks to increase the reliability of embedded systems. Four …

Readactor: Practical code randomization resilient to memory disclosure

S Crane, C Liebchen, A Homescu… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Code-reuse attacks such as return-oriented programming (ROP) pose a severe threat to
modern software. Designing practical and effective defenses against code-reuse attacks is …

[PDF][PDF] Opaque Control-Flow Integrity.

V Mohan, P Larsen, S Brunthaler… - …, 2015 - publications.sba-research.org
A new binary software randomization and Control-Flow Integrity (CFI) enforcement system is
presented, which is the first to efficiently resist code-reuse attacks launched by informed …

[PDF][PDF] Thwarting cache side-channel attacks through dynamic software diversity.

S Crane, A Homescu, S Brunthaler, P Larsen, M Franz - NDSS, 2015 - unibw.de
We explore software diversity as a defense against side-channel attacks by dynamically and
systematically randomizing the control flow of programs. Existing software diversity …

Toward a moving target defense for web applications

M Taguinod, A Doupé, Z Zhao… - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
Web applications are a critical component of the security ecosystem as they are often the
front door for many companies, as such, vulnerabilities in web applications allow hackers …

Large-scale automated software diversity—program evolution redux

A Homescu, T Jackson, S Crane… - … on Dependable and …, 2015 - ieeexplore.ieee.org
The software monoculture favors attackers over defenders, since it makes all target
environments appear similar. Code-reuse attacks, for example, rely on target hosts running …

Automatic software diversity

P Larsen, S Brunthaler, M Franz - IEEE Security & Privacy, 2015 - ieeexplore.ieee.org
Vulnerabilities in low-level systems software leave users exposed to malware, theft, and
monitoring. Automatic software diversity makes weaponization of these vulnerabilities much …

Code-reuse attacks and defenses

LV Davi - 2015 - tuprints.ulb.tu-darmstadt.de
ZUSAMMENFASSUNG Laufzeitangriffe nutzen Speicher-und Programmierfehler aus, um
beliebiges Schadverhalten auf einem Computersystem zu verursachen. Obwohl diese …

Software-based protection against changeware

S Banescu, A Pretschner, D Battré… - Proceedings of the 5th …, 2015 - dl.acm.org
We call changeware software that surreptitiously modifies resources of software
applications, eg, configuration files. Changeware is developed by malicious entities which …