Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

Moving target defense: state of the art and characteristics

G Cai, B Wang, W Hu, T Wang - Frontiers of Information Technology & …, 2016 - Springer
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the
asymmetric situation between attacks and defenses in cyber-security. Numerous related …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Return to the zombie gadgets: Undermining destructive code reads via code inference attacks

KZ Snow, R Rogowski, J Werner, H Koo… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
The concept of destructive code reads is a new defensive strategy that prevents code reuse
attacks by coupling fine-grained address space layout randomization with a mitigation for …

Diversity-by-design for dependable and secure cyber-physical systems: A survey

Q Zhang, AZ Mohammed, Z Wan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Diversity-based security approaches have been studied for several decades since the
1970s. The concept of diversity-by-design emerged in the 1980s. Since then, diversity …

[PDF][PDF] A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations.

W Lian, H Shacham, S Savage - NDSS, 2017 - cs.utexas.edu
JIT spraying allows an attacker to subvert a Just-In-Time compiler, introducing instruction
sequences useful to the attacker into executable regions of the victim program's address …

Characterizing the running patterns of moving target defense mechanisms

G Cai, B Wang, Y Luo, S Li… - 2016 18th International …, 2016 - ieeexplore.ieee.org
Moving Target Defense (MTD) has been proposed as a game-changing theme to increase
the work effort to attack as well as the security of target system. There has been proposed a …

Hardware security for just-in-time compilation in language virtual machines

Q Ducasse - 2024 - theses.hal.science
Language Virtual Machines (VMs) are the run-time environment of popular high level
managed languages. They offer portability and memory handling for the developer and are …

Moving target, deception, and other adaptive defenses

B Blakely, W Horsthemke, A Poczatec, L Nowak… - … control systems security …, 2019 - Springer
Moving target defenses raise the cost of an attack to make it more difficult or infeasible.
Strategies to do so include implementing diversity, movement, and obfuscation at the …

[PDF][PDF] 改进的基于底层虚拟机混淆器的指令混淆框架

王雅仪, 刘琛, 黄天波, 文伟平 - 计算机应用, 2023 - pkuexploit.com
(北京大学软件与微电子学院, 北京102600)(* 通信作者电子邮箱weipingwen@ pku. edu. cn)
摘要: 针对底层虚拟机混淆器(ollvm) 在指令混淆层面只支持指令替换一种算法, 且仅支持5 …