Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020‏ - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

Moving target defense techniques: A survey

C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018‏ - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …

SoK: Automated software diversity

P Larsen, A Homescu, S Brunthaler… - 2014 IEEE Symposium …, 2014‏ - ieeexplore.ieee.org
The idea of automatic software diversity is at least two decades old. The deficiencies of
currently deployed defenses and the transition to online software distribution (the" App store" …

Missing the point (er): On the effectiveness of code pointer integrity

I Evans, S Fingeret, J Gonzalez… - … IEEE Symposium on …, 2015‏ - ieeexplore.ieee.org
Memory corruption attacks continue to be a major vector of attack for compromising modern
systems. Numerous defenses have been proposed against memory corruption attacks, but …

Moving target defense: state of the art and characteristics

G Cai, B Wang, W Hu, T Wang - Frontiers of Information Technology & …, 2016‏ - Springer
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the
asymmetric situation between attacks and defenses in cyber-security. Numerous related …

Information leaks without memory disclosures: Remote side channel attacks on diversified code

J Seibert, H Okhravi, E Söderström - Proceedings of the 2014 ACM …, 2014‏ - dl.acm.org
Code diversification has been proposed as a technique to mitigate code reuse attacks,
which have recently become the predominant way for attackers to exploit memory corruption …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018‏ - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

A survey on the moving target defense strategies: An architectural perspective

J Zheng, AS Namin - Journal of Computer Science and Technology, 2019‏ - Springer
As the complexity and the scale of networks continue to grow, the management of the
network operations and security defense has become a challenging task for network …

Mimic defense: a designed‐in cybersecurity defense framework

H Hu, J Wu, Z Wang, G Cheng - IET Information Security, 2018‏ - Wiley Online Library
In recent years, both academia and industry in cyber security have tried to develop
innovative defense technologies, expecting that to change the rules of the game between …

A survey on cyber-resilience approaches for cyber-physical systems

M Segovia-Ferreira, J Rubio-Hernan, A Cavalli… - ACM Computing …, 2024‏ - dl.acm.org
Concerns for the resilience of Cyber-Physical Systems (CPS) s in critical infrastructure are
growing. CPS integrate sensing, computation, control, and networking into physical objects …