A survey: When moving target defense meets game theory

J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code

R Wartell, V Mohan, KW Hamlen, Z Lin - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Unlike library code, whose instruction addresses can be randomized by address space
layout randomization (ASLR), application binary code often has static instruction addresses …

{PAC} it up: Towards pointer integrity using {ARM} pointer authentication

H Liljestrand, T Nyman, K Wang, CC Perez… - 28th USENIX Security …, 2019 - usenix.org
Run-time attacks against programs written in memory-unsafe programming languages (eg,
C and C++) remain a prominent threat against computer systems. The prevalence of …

Practical {Data-Only} attack generation

B Johannesmeyer, A Slowinska, H Bos… - 33rd USENIX Security …, 2024 - usenix.org
As control-flow hijacking is getting harder due to increasingly sophisticated CFI solutions,
recent work has instead focused on automatically building data-only attacks, typically using …

SGXBOUNDS: Memory safety for shielded execution

D Kuvaiskii, O Oleksenko, S Arnautov, B Trach… - Proceedings of the …, 2017 - dl.acm.org
Shielded execution based on Intel SGX provides strong security guarantees for legacy
applications running on untrusted platforms. However, memory safety attacks such as …

Finding focus in the blur of moving-target techniques

H Okhravi, T Hobson, D Bigelow… - IEEE Security & …, 2013 - ieeexplore.ieee.org
Protecting critical systems and assets against cyberattacks is an ever more difficult
challenge that strongly favors attackers. Whereas defenders must protect a large, diverse set …

Litehax: lightweight hardware-assisted attestation of program execution

G Dessouky, T Abera, A Ibrahim… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Unlike traditional processors, embedded Internet of Things (IoT) devices lack resources to
incorporate protection against modern sophisticated attacks resulting in critical …

Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn

M Gallagher, L Biernacki, S Chen, ZB Aweke… - Proceedings of the …, 2019 - dl.acm.org
Attacks often succeed by abusing the gap between program and machine-level semantics--
for example, by locating a sensitive pointer, exploiting a bug to overwrite this sensitive data …

Markov modeling of moving target defense games

H Maleki, S Valizadeh, W Koch, A Bestavros… - Proceedings of the …, 2016 - dl.acm.org
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis.
The framework allows modeling of a broad range of MTD strategies, provides general …