Effectiveness of moving target defenses

D Evans, A Nguyen-Tuong, J Knight - Moving Target Defense: Creating …, 2011 - Springer
Moving target defenses have been proposed as a way to make it much more difficult for an
attacker to exploit a vulnerable system by changing aspects of that system to present …

[PDF][PDF] Survey of cyber moving targets second edition

BC Ward, SR Gomez, R Skowyra, D Bigelow… - MIT Lincoln Laboratory …, 2018 - mit.edu
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …

Methods, systems, and computer readable media for detecting injected machine code

K Snow, F Monrose, S Krishnan - US Patent 9,305,165, 2016 - Google Patents
According to one aspect, the Subject matter described herein includes a method for
detecting injected machine code. The method includes extracting data content from a buffer …

[PDF][PDF] Survey of cyber moving targets

H Okhravi, MA Rabe, TJ Mayberry, WG Leonard… - … Institute of Technology …, 2013 - mit.edu
This survey provides an overview of different cyber moving target techniques, their threat
models, and their technical details. A cyber moving target technique refers to any technique …

Racewalk: fast instruction frequency analysis and classification for shellcode detection in network flow

D Gamayunov, NTM Quan, F Sakharov… - 2009 European …, 2009 - ieeexplore.ieee.org
Memory corruption attacks still play a significant role in present cybercrime activities, being
one of the keystones for worm, virus propagation and building botnets. Moreover, recent …

[PDF][PDF] PMASCE-Polymorphic and Metamorphic Shellcode Creation Engine

NK Popli, A Girdhar - meri.edu.in
Signature detection is ultimately going to be of no use in the future of AVs and IDS systems.
The obfuscation of several parts of the exploit code is becoming so detailed that it could …

Identifying Code Injection and Reuse Payloads In Memory Error Exploits

K Snow - 2014 - cdr.lib.unc.edu
Today's most widely exploited applications are the web browsers and document readers we
use every day. The immediate goal of these attacks is to compromise target systems by …