Effectiveness of moving target defenses
Moving target defenses have been proposed as a way to make it much more difficult for an
attacker to exploit a vulnerable system by changing aspects of that system to present …
attacker to exploit a vulnerable system by changing aspects of that system to present …
[PDF][PDF] Survey of cyber moving targets second edition
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …
models, and their technical details. A cyber moving-target technique refers to any technique …
Methods, systems, and computer readable media for detecting injected machine code
According to one aspect, the Subject matter described herein includes a method for
detecting injected machine code. The method includes extracting data content from a buffer …
detecting injected machine code. The method includes extracting data content from a buffer …
[PDF][PDF] Survey of cyber moving targets
This survey provides an overview of different cyber moving target techniques, their threat
models, and their technical details. A cyber moving target technique refers to any technique …
models, and their technical details. A cyber moving target technique refers to any technique …
Racewalk: fast instruction frequency analysis and classification for shellcode detection in network flow
Memory corruption attacks still play a significant role in present cybercrime activities, being
one of the keystones for worm, virus propagation and building botnets. Moreover, recent …
one of the keystones for worm, virus propagation and building botnets. Moreover, recent …
[PDF][PDF] PMASCE-Polymorphic and Metamorphic Shellcode Creation Engine
NK Popli, A Girdhar - meri.edu.in
Signature detection is ultimately going to be of no use in the future of AVs and IDS systems.
The obfuscation of several parts of the exploit code is becoming so detailed that it could …
The obfuscation of several parts of the exploit code is becoming so detailed that it could …
Identifying Code Injection and Reuse Payloads In Memory Error Exploits
K Snow - 2014 - cdr.lib.unc.edu
Today's most widely exploited applications are the web browsers and document readers we
use every day. The immediate goal of these attacks is to compromise target systems by …
use every day. The immediate goal of these attacks is to compromise target systems by …