A survey of software aging and rejuvenation studies
Software aging is a phenomenon plaguing many long-running complex software systems,
which exhibit performance degradation or an increasing failure rate. Several strategies …
which exhibit performance degradation or an increasing failure rate. Several strategies …
[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …
protecting computers from harmful malware. The goal of these techniques is not removing …
Genprog: A generic method for automatic software repair
This paper describes GenProg, an automated method for repairing defects in off-the-shelf,
legacy programs without formal specifications, program annotations, or special coding …
legacy programs without formal specifications, program annotations, or special coding …
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
Unlike library code, whose instruction addresses can be randomized by address space
layout randomization (ASLR), application binary code often has static instruction addresses …
layout randomization (ASLR), application binary code often has static instruction addresses …
Enhanced operating system security through efficient and fine-grained address space randomization
In recent years, the deployment of many application-level countermeasures against memory
errors and the increasing number of vulnerabilities discovered in the kernel has fostered a …
errors and the increasing number of vulnerabilities discovered in the kernel has fostered a …
Finding focus in the blur of moving-target techniques
Protecting critical systems and assets against cyberattacks is an ever more difficult
challenge that strongly favors attackers. Whereas defenders must protect a large, diverse set …
challenge that strongly favors attackers. Whereas defenders must protect a large, diverse set …
Memory errors: The past, the present, and the future
Memory error exploitations have been around for over 25 years and still rank among the top
3 most dangerous software errors. Why haven't we been able to stop them? Given the host …
3 most dangerous software errors. Why haven't we been able to stop them? Given the host …
Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks
Diversity has long been regarded as a security mechanism for improving the resilience of
software and networks against various attacks. More recently, diversity has found new …
software and networks against various attacks. More recently, diversity has found new …