[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - ACM Computing …, 2024 - dl.acm.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

SoK: automatic deobfuscation of virtualization-protected applications

P Kochberger, S Schrittwieser, S Schweighofer… - Proceedings of the 16th …, 2021 - dl.acm.org
Malware authors often rely on code obfuscation to hide the malicious functionality of their
software, making detection and analysis more difficult. One of the most advanced techniques …

Evaluation Methodologies in Software Protection Research

B De Sutter, S Schrittwieser, B Coppens… - arXiv preprint arXiv …, 2023 - arxiv.org
Man-at-the-end (MATE) attackers have full control over the system on which the attacked
software runs, and try to break the confidentiality or integrity of assets embedded in the …

Interface diversification in IoT operating systems

P Mäki, S Rauti, S Hosseinzadeh, L Koivunen… - Proceedings of the 9th …, 2016 - dl.acm.org
With the advancement of Internet in Things (IoT) more and more" things" are connected to
each other through the Internet. Due to the fact that the collected information may contain …

CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware

MAM Hassanin, I Martinovic - Journal of Cybersecurity, 2024 - academic.oup.com
In 2021, the largest US pipeline system for refined oil products suffered a 6-day shutdown
due to a ransomware attack [1]. In 2023, the sensitive systems of the US Marshals Service …

Diversity-by-design for dependable and secure cyber-physical systems: A survey

Q Zhang, AZ Mohammed, Z Wan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Diversity-based security approaches have been studied for several decades since the
1970s. The concept of diversity-by-design emerged in the 1980s. Since then, diversity …

面向主动防御的多样性研究进展

仝青, 郭云飞, 霍树民, 王亚文 - Journal of Cyber Security, 2022 - jcs.iie.ac.cn
不同软件或执行过程通常存在不同的脆弱性, 多样性技术基于该前提应用于系统的可靠性,
安全性设计中, 显著增强了系统的防御能力和入侵容忍能力, 然而也存在系统代价高 …

Internal interface diversification as a security measure in sensor networks

S Rauti, L Koivunen, P Mäki, S Hosseinzadeh… - Journal of Sensor and …, 2018 - mdpi.com
More actuator and sensor devices are connected to the Internet of Things (IoT) every day,
and the network keeps growing, while software security of the devices is often incomplete …

Investigating the possibility of data leakage in time of live VM migration

R Yasmin, MR Memarian, S Hosseinzadeh… - Cyber Threat …, 2018 - Springer
Virtual machine migration is a powerful technique used to balance the workload of hosts in
environments such as a cloud data center. In that technique, VMs can be transferred from a …