Moving target defense techniques: A survey

C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …

Three decades of deception techniques in active cyber defense-retrospect and outlook

L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …

SoK: Automated software diversity

P Larsen, A Homescu, S Brunthaler… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Selfrando: Securing the tor browser against de-anonymization exploits

M Conti, S Crane, T Frassetto, A Homescu… - Proceedings on …, 2016 - petsymposium.org
Tor is a well-known anonymous communication system used by millions of users, including
journalists and civil rights activists all over the world. The Tor Browser gives non-technical …

Integrated moving target defense and control reconfiguration for securing cyber-physical systems

B Potteiger, Z Zhang, X Koutsoukos - Microprocessors and microsystems, 2020 - Elsevier
With the increasingly connected nature of Cyber-Physical Systems (CPS), new attack
vectors are emerging that were previously not considered in the design process …

NG-MVEE: A new proposed hybrid technique for enhanced mitigation of code re-use attack

AM El-Zoghby, MS Elsayed, AD Jurcut, MA Azer - IEEE Access, 2023 - ieeexplore.ieee.org
Code-Reuse Attacks (CRAs) are solid mechanisms to bypass advanced software and
hardware defenses because they use the software's own code and they are very hard to be …

ROPGMN: Effective ROP and variants discovery using dynamic feature and graph matching network

W Niu, K Zhang, R Yan, J Li, Y Zhang… - Future Generation …, 2025 - Elsevier
Abstract Return Oriented Programming (ROP) is one of the most challenging threats to
operating systems. Traditional detection and defense techniques for ROP such as stack …

A survey of exploitation techniques and defenses for program data attacks

Y Wang, Q Li, Z Chen, P Zhang, G Zhang - Journal of Network and …, 2020 - Elsevier
In recent years, program data attacks (PDA) have become a popular topic in the field of
network security. PDAs are memory corruption vulnerability exploitation techniques that …

Marlin: Mitigating code reuse attacks using code randomization

A Gupta, J Habibi, MS Kirkpatrick… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Code-reuse attacks, such as return-oriented programming (ROP), are a class of buffer
overflow attacks that repurpose existing executable code towards malicious purposes …