Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Moving target defense techniques: A survey

C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …

{FLUSH+ RELOAD}: A high resolution, low noise, l3 cache {Side-Channel} attack

Y Yarom, K Falkner - 23rd USENIX security symposium (USENIX security …, 2014 - usenix.org
Sharing memory pages between non-trusting processes is a common method of reducing
the memory footprint of multi-tenanted systems. In this paper we demonstrate that, due to a …

The cybersecurity landscape in industrial control systems

S McLaughlin, C Konstantinou, X Wang… - Proceedings of the …, 2016 - ieeexplore.ieee.org
Industrial control systems (ICSs) are transitioning from legacy-electromechanical-based
systems to modern information and communication technology (ICT)-based systems …

Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization

KZ Snow, F Monrose, L Davi… - … IEEE symposium on …, 2013 - ieeexplore.ieee.org
Fine-grained address space layout randomization (ASLR) has recently been proposed as a
method of efficiently mitigating runtime attacks. In this paper, we introduce the design and …

SoK: Automated software diversity

P Larsen, A Homescu, S Brunthaler… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …

[PS][PS] Practical byzantine fault tolerance

M Castro, B Liskov - OsDI, 1999 - usenix.org
This paper describes a new replication algorithm that is able to tolerate Byzantine faults. We
believe that Byzantinefault-tolerant algorithms will be increasingly important in the future …

Practical byzantine fault tolerance and proactive recovery

M Castro, B Liskov - ACM Transactions on Computer Systems (TOCS), 2002 - dl.acm.org
Our growing reliance on online services accessible on the Internet demands highly
available systems that provide correct service without interruptions. Software bugs, operator …

Readactor: Practical code randomization resilient to memory disclosure

S Crane, C Liebchen, A Homescu… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Code-reuse attacks such as return-oriented programming (ROP) pose a severe threat to
modern software. Designing practical and effective defenses against code-reuse attacks is …

[PDF][PDF] Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks.

C Cowan, C Pu, D Maier, J Walpole, P Bakke… - USENIX security …, 1998 - usenix.org
This paper presents a systematic solution to the persistent problem of buffer overflow
attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident …