A survey of software aging and rejuvenation studies

D Cotroneo, R Natella, R Pietrantuono… - ACM Journal on …, 2014 - dl.acm.org
Software aging is a phenomenon plaguing many long-running complex software systems,
which exhibit performance degradation or an increasing failure rate. Several strategies …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Genprog: A generic method for automatic software repair

C Le Goues, TV Nguyen, S Forrest… - Ieee transactions on …, 2011 - ieeexplore.ieee.org
This paper describes GenProg, an automated method for repairing defects in off-the-shelf,
legacy programs without formal specifications, program annotations, or special coding …

Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code

R Wartell, V Mohan, KW Hamlen, Z Lin - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Unlike library code, whose instruction addresses can be randomized by address space
layout randomization (ASLR), application binary code often has static instruction addresses …

Enhanced operating system security through efficient and fine-grained address space randomization

C Giuffrida, A Kuijsten, AS Tanenbaum - 21st USENIX Security …, 2012 - usenix.org
In recent years, the deployment of many application-level countermeasures against memory
errors and the increasing number of vulnerabilities discovered in the kernel has fostered a …

Finding focus in the blur of moving-target techniques

H Okhravi, T Hobson, D Bigelow… - IEEE Security & …, 2013 - ieeexplore.ieee.org
Protecting critical systems and assets against cyberattacks is an ever more difficult
challenge that strongly favors attackers. Whereas defenders must protect a large, diverse set …

Memory errors: The past, the present, and the future

V Van der Veen, N Dutt-Sharma, L Cavallaro… - Research in Attacks …, 2012 - Springer
Memory error exploitations have been around for over 25 years and still rank among the top
3 most dangerous software errors. Why haven't we been able to stop them? Given the host …

Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks

M Zhang, L Wang, S Jajodia, A Singhal… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Diversity has long been regarded as a security mechanism for improving the resilience of
software and networks against various attacks. More recently, diversity has found new …