Moving target defense techniques: A survey
C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …
moving target defense research has become one of the hot spots. In order to gain better …
Three decades of deception techniques in active cyber defense-retrospect and outlook
L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …
paper, we review representative techniques in honeypots, honeytokens, and moving target …
SoK: Automated software diversity
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …
currently deployed defenses and the transition to online software distribution (the" App store" …
[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …
protecting computers from harmful malware. The goal of these techniques is not removing …
Selfrando: Securing the tor browser against de-anonymization exploits
Tor is a well-known anonymous communication system used by millions of users, including
journalists and civil rights activists all over the world. The Tor Browser gives non-technical …
journalists and civil rights activists all over the world. The Tor Browser gives non-technical …
Integrated moving target defense and control reconfiguration for securing cyber-physical systems
With the increasingly connected nature of Cyber-Physical Systems (CPS), new attack
vectors are emerging that were previously not considered in the design process …
vectors are emerging that were previously not considered in the design process …
NG-MVEE: A new proposed hybrid technique for enhanced mitigation of code re-use attack
Code-Reuse Attacks (CRAs) are solid mechanisms to bypass advanced software and
hardware defenses because they use the software's own code and they are very hard to be …
hardware defenses because they use the software's own code and they are very hard to be …
ROPGMN: Effective ROP and variants discovery using dynamic feature and graph matching network
W Niu, K Zhang, R Yan, J Li, Y Zhang… - Future Generation …, 2025 - Elsevier
Abstract Return Oriented Programming (ROP) is one of the most challenging threats to
operating systems. Traditional detection and defense techniques for ROP such as stack …
operating systems. Traditional detection and defense techniques for ROP such as stack …
A survey of exploitation techniques and defenses for program data attacks
Y Wang, Q Li, Z Chen, P Zhang, G Zhang - Journal of Network and …, 2020 - Elsevier
In recent years, program data attacks (PDA) have become a popular topic in the field of
network security. PDAs are memory corruption vulnerability exploitation techniques that …
network security. PDAs are memory corruption vulnerability exploitation techniques that …
Marlin: Mitigating code reuse attacks using code randomization
A Gupta, J Habibi, MS Kirkpatrick… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Code-reuse attacks, such as return-oriented programming (ROP), are a class of buffer
overflow attacks that repurpose existing executable code towards malicious purposes …
overflow attacks that repurpose existing executable code towards malicious purposes …