多变体执行安全防御技术研究综述

姚东, 张铮, 张高斐, 刘浩, 潘传幸, 邬江兴 - 信息安全学报, 2020 - jcs.iie.ac.cn
软件和信息系统的高速发展在给人们生活带来诸多便利的同时, 也让更多的安全风险来到了我们
身边, 不法分子可以很方便的利用无处不在的网络和越来越自动化, 低门槛的攻击技术去获得 …

MVX-CFI: 一种实用的软件安全主动防御架构

姚东, 张铮, 张高斐, 邬江兴 - Journal of Cyber Security, 2020 - jcs.iie.ac.cn
软件安全是网络空间安全中最重要的环节. 早期的软件安全解决方案大多是发现安全威胁后再
逐一解决的被动防御方案. 为了有效应对各类安全威胁, 防御方法逐渐从被动过渡到主动 …

编译支持的多变体融合执行设计与实现

李秉政, 张铮, 马博林, 邢福康, 邬江兴 - Journal of Cyber Security, 2022 - jcs.iie.ac.cn
多变体执行是由异构冗余变体并行执行来检测攻击的一种技术. 作为一种主动防御技术,
多变体执行(multi-variant execution, MVX) 通过并行运行的异构执行体之间一致性检查发现 …

[PDF][PDF] 高可靠信息系统非相似冗余架构中的执行体同步技术

于洪, 刘勤让, 魏帅, 兰巨龙 - 电子与信息学报, 2024 - jeit.ac.cn
非相似冗余架构被广泛使用到信息系统中, 提高系统的安全性和可靠性. 非相似冗余架构中的
执行体之间存在差异, 当系统正常工作时, 执行体表现一致, 但在面对恶意攻击行为时 …

多变体执行误报问题分析与解决方法综述.

席睿成, 张铮, 朱鹏喆, 刘子敬 - Application Research of …, 2022 - search.ebscohost.com
从安全角度出发, 多变体执行(multi variantexecution, MVX) 被广泛应用于网络安全防御,
但多变体执行存在一个共性问题: 即各路执行体向裁决器返回内容时, 合路产生的误报难以解决 …

SoK: A Survey on Redundant Execution Technology

Z Liu, Z Zhang, R Xi, P Zhu, B Ma - … International Conference on …, 2022 - ieeexplore.ieee.org
Redundant execution technology is one of the effective ways to improve the safety and
reliability of computer systems. By rationally configuring redundant resources, adding …

Executer Synchronization in Highly Reliable Information System with Dissimilar Redundancy Architecture

H YU, Q LIU, S WEI, J LAN - 电子与信息学报, 2024 - jeit.ac.cn
Dissimilar redundancy architecture is widely used in information systems to improve their
security and reliability. When the system operates normally, the executers behave …

SecMVX: Analysis on the vulnerability of multi-variant execution

B Li, Z Zhang, X Wang, S Qu, J Wu - China Communications, 2021 - ieeexplore.ieee.org
As an active defenses technique, multivariant execution (MVX) can detect attacks by
monitoring the consistency of heterogeneous variants with parallel execution. Compared …

Multi-variant execution: State-of-the-art and research challenges

G Zhang, Z Zhang, B Ma, J Wang - 2020 12th International …, 2020 - ieeexplore.ieee.org
As Internet security issues are becoming increasingly serious, many scholars and experts
are exploring new defense strategies. The availability of multi-core computers and cloud …

Practical Control Flow Integrity using Multi-Variant execution

D Yao, Z Zhang, G Zhang - … of the 2020 International Conference on …, 2020 - dl.acm.org
The popularity of computers and networks brings many conveniences to our daily life but
also brings a variety of security threats. The proliferation of attacks and the rapid spread of …