Moving target defense techniques: A survey

C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …

A tutorial on software obfuscation

S Banescu, A Pretschner - Advances in Computers, 2018 - Elsevier
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a
challenging security problem. The creator is an entity which can range from a single person …

Mimic defense: a designed‐in cybersecurity defense framework

H Hu, J Wu, Z Wang, G Cheng - IET Information Security, 2018 - Wiley Online Library
In recent years, both academia and industry in cyber security have tried to develop
innovative defense technologies, expecting that to change the rules of the game between …

Guaranteed physical security with restart-based design for cyber-physical systems

F Abdi, CY Chen, M Hasan, S Liu… - 2018 ACM/IEEE 9th …, 2018 - ieeexplore.ieee.org
Physical plants that form the core of the Cyber-Physical Systems (CPS) often have stringent
safety requirements. Recent attacks have shown that cyber intrusions can result in the safety …

[PDF][PDF] Survey of cyber moving targets second edition

BC Ward, SR Gomez, R Skowyra, D Bigelow… - MIT Lincoln Laboratory …, 2018 - mit.edu
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …

Automated runtime detection of malware

SV Gupta, RF DeMeo - US Patent 10,079,841, 2018 - Google Patents
One example method and correspond apparatus extracts a model of a computer application
during load time and stores the model of the computer application in a database. This …

An exploratory analysis of microcode as a building block for system defenses

B Kollenda, P Koppe, M Fyrbiak, C Kison… - Proceedings of the …, 2018 - dl.acm.org
Microcode is an abstraction layer used by modern x86 processors that interprets user-visible
CISC instructions to hardware-internal RISC instructions. The capability to update x86 …

Requirements and specifications for adaptive security: concepts and analysis

TT Tun, M Yang, AK Bandara, Y Yu… - Proceedings of the 13th …, 2018 - dl.acm.org
In an adaptive security-critical system, security mechanisms change according to the type of
threat posed by the environment. Specifying the behavior of these systems is difficult …

Moving target defense against advanced persistent threats for cybersecurity enhancement

M Khosravi-Farmad, AA Ramaki… - 2018 8th International …, 2018 - ieeexplore.ieee.org
One of the main security concerns of enterprise-level organizations which provide network-
based services is combating with complex cybersecurity attacks like advanced persistent …

Invalid data-aware coding to enhance the read performance of high-density flash memories

W Choi, M Jung, M Kandemir - 2018 51st Annual IEEE/ACM …, 2018 - ieeexplore.ieee.org
High bit-density flash memories such as Multi-Level Cell (MLC) and Triple-Level Cell (TLC)
flash have become a norm, since doubling the cell bit-density can increase the storage …