A survey: When moving target defense meets game theory
J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …
protecting computers from harmful malware. The goal of these techniques is not removing …
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
Unlike library code, whose instruction addresses can be randomized by address space
layout randomization (ASLR), application binary code often has static instruction addresses …
layout randomization (ASLR), application binary code often has static instruction addresses …
{PAC} it up: Towards pointer integrity using {ARM} pointer authentication
Run-time attacks against programs written in memory-unsafe programming languages (eg,
C and C++) remain a prominent threat against computer systems. The prevalence of …
C and C++) remain a prominent threat against computer systems. The prevalence of …
Practical {Data-Only} attack generation
As control-flow hijacking is getting harder due to increasingly sophisticated CFI solutions,
recent work has instead focused on automatically building data-only attacks, typically using …
recent work has instead focused on automatically building data-only attacks, typically using …
SGXBOUNDS: Memory safety for shielded execution
Shielded execution based on Intel SGX provides strong security guarantees for legacy
applications running on untrusted platforms. However, memory safety attacks such as …
applications running on untrusted platforms. However, memory safety attacks such as …
Finding focus in the blur of moving-target techniques
Protecting critical systems and assets against cyberattacks is an ever more difficult
challenge that strongly favors attackers. Whereas defenders must protect a large, diverse set …
challenge that strongly favors attackers. Whereas defenders must protect a large, diverse set …
Litehax: lightweight hardware-assisted attestation of program execution
Unlike traditional processors, embedded Internet of Things (IoT) devices lack resources to
incorporate protection against modern sophisticated attacks resulting in critical …
incorporate protection against modern sophisticated attacks resulting in critical …
Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn
Attacks often succeed by abusing the gap between program and machine-level semantics--
for example, by locating a sensitive pointer, exploiting a bug to overwrite this sensitive data …
for example, by locating a sensitive pointer, exploiting a bug to overwrite this sensitive data …
Markov modeling of moving target defense games
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis.
The framework allows modeling of a broad range of MTD strategies, provides general …
The framework allows modeling of a broad range of MTD strategies, provides general …