Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

Moving target defense techniques: A survey

C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …

SoK: Automated software diversity

P Larsen, A Homescu, S Brunthaler… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …

Missing the point (er): On the effectiveness of code pointer integrity

I Evans, S Fingeret, J Gonzalez… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Memory corruption attacks continue to be a major vector of attack for compromising modern
systems. Numerous defenses have been proposed against memory corruption attacks, but …

Information leaks without memory disclosures: Remote side channel attacks on diversified code

J Seibert, H Okhravi, E Söderström - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Code diversification has been proposed as a technique to mitigate code reuse attacks,
which have recently become the predominant way for attackers to exploit memory corruption …

Moving target defense: state of the art and characteristics

G Cai, B Wang, W Hu, T Wang - Frontiers of Information Technology & …, 2016 - Springer
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the
asymmetric situation between attacks and defenses in cyber-security. Numerous related …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

A survey on the moving target defense strategies: An architectural perspective

J Zheng, AS Namin - Journal of Computer Science and Technology, 2019 - Springer
As the complexity and the scale of networks continue to grow, the management of the
network operations and security defense has become a challenging task for network …

Mimic defense: a designed‐in cybersecurity defense framework

H Hu, J Wu, Z Wang, G Cheng - IET Information Security, 2018 - Wiley Online Library
In recent years, both academia and industry in cyber security have tried to develop
innovative defense technologies, expecting that to change the rules of the game between …

Characterizing the power of moving target defense via cyber epidemic dynamics

Y Han, W Lu, S Xu - Proceedings of the 2014 Symposium and Bootcamp …, 2014 - dl.acm.org
Moving Target Defense (MTD) can enhance the resilience of cyber systems against attacks.
Although there have been many MTD techniques, there is no systematic understanding and …