Layered obfuscation: a taxonomy of software obfuscation techniques for layered security

H Xu, Y Zhou, J Ming, M Lyu - Cybersecurity, 2020 - Springer
Software obfuscation has been developed for over 30 years. A problem always confusing
the communities is what security strength the technique can achieve. Nowadays, this …

[PDF][PDF] 多变体执行安全防御技术研究综述

姚东, 张铮, 张高斐, 刘浩, 潘传幸… - Journal of Cyber Security …, 2020 - jcs.iie.ac.cn
摘要软件和信息系统的高速发展在给人们生活带来诸多便利的同时, 也让更多的安全风险来到了
我们身边, 不法分子可以很方便的利用无处不在的网络和越来越自动化, 低门槛的攻击技术去 …

Crow: Code diversification for webassembly

JC Arteaga, O Malivitsis, OV Perez, B Baudry… - arXiv preprint arXiv …, 2020 - arxiv.org
The adoption of WebAssembly has rapidly increased in the last few years as it provides a
fast and safe model for program execution. However, WebAssembly is not exempt from …

Switched-based resilient control of cyber-physical systems

M Segovia-Ferreira, J Rubio-Hernan, R Cavalli… - IEEE …, 2020 - ieeexplore.ieee.org
We present a control-theoretic approach to achieve Cyber-Physical Systems (CPS) resilient
designs. We assume situations in which the CPS must maintain the correct operation of a set …

Bio-inspired formal model for space/time virtual machine randomization and diversification

N Ahmed, B Bhargava - IEEE Transactions on Cloud …, 2020 - ieeexplore.ieee.org
Studies on resiliency against system attacks have contributed well established defensive
techniques, sound protocols and paradigms in distributed systems' literature. One of this …

A praise for defensive programming: Leveraging uncertainty for effective malware mitigation

R Sun, M Botacin, N Sapountzis, X Yuan… - … on Dependable and …, 2020 - ieeexplore.ieee.org
A promising avenue for improving the effectiveness of behavioral-based malware detectors
is to leverage two-phase detection mechanisms. Existing problem in two-phase detection is …

Methods, systems, and computer readable media for preventing code reuse attacks

JJ Werner, KZ Snow, NM Otterness, RJ Dallara… - US Patent …, 2020 - Google Patents
Methods, systems, and computer readable media for pre venting code reuse attacks are
disclosed. According to one method, the method includes executing, on a processor, code in …

Code renewability for native software protection

B Abrath, B Coppens, JVD Broeck, B Wyseur… - ACM Transactions on …, 2020 - dl.acm.org
Software protection aims at safeguarding assets embedded in software by preventing and
delaying reverse engineering and tampering attacks. This article presents an architecture …

Software diversity for cyber deception

AB Sarr, AH Anwar, C Kamhoua… - … 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we propose a cyber deception approach using software diversity in a
honeynet. Honeypot allocation is used as an active cyber deception technique to increase …

Enhancing randomization entropy of x86-64 code while preserving semantic consistency

X Feng, D Wang, Z Lin, X Kuang… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Code randomization is considered as the basis of mitigation against code reuse attacks,
fundamentally supporting some recent proposals such as execute-only memory (XOM) that …