메뉴 건너뛰기




Volumn 7, Issue 1, 2009, Pages 26-33

Security through diversity: Leveraging virtual machine technology

Author keywords

Artificial diversity; IT monoculture; Security; Virtual machine

Indexed keywords

ARTIFICIAL DIVERSITY; IT MONOCULTURE; NETWORKED COMPUTING SYSTEMS; SECURITY; SOFTWARE MONOCULTURES; SOFTWARE SYSTEMS; VIRTUAL MACHINE; VIRTUAL MACHINE TECHNOLOGIES;

EID: 60049100434     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.18     Document Type: Review
Times cited : (70)

References (14)
  • 2
    • 0017792448 scopus 로고
    • On the Implementation of N-Version Programming for Software Fault Tolerance During Execution
    • IEEE Press
    • A. Avizienis and L. Chen, "On the Implementation of N-Version Programming for Software Fault Tolerance During Execution," Proc. 1st IEEE Int'l Computer Science Applications Conf., IEEE Press, 1977, pp. 149-155.
    • (1977) Proc. 1st IEEE Int'l Computer Science Applications Conf , pp. 149-155
    • Avizienis, A.1    Chen, L.2
  • 3
    • 0023997325 scopus 로고
    • Data Diversity: An Approach to Software Fault Tolerance
    • P.E. Ammann and J.C. Knight, "Data Diversity: An Approach to Software Fault Tolerance," IEEE Trans. Computer, vol. 37, no. 4, 1988, pp. 418-425.
    • (1988) IEEE Trans. Computer , vol.37 , Issue.4 , pp. 418-425
    • Ammann, P.E.1    Knight, J.C.2
  • 4
    • 84954188728 scopus 로고    scopus 로고
    • Efficient Techniques for Comprehensive Protection from Memory Error Exploits
    • Usenix Assoc
    • S. Bhatkar, R. Sekar, and D.C. DuVarney, "Efficient Techniques for Comprehensive Protection from Memory Error Exploits," Proc. 14th Conf. Usenix Security Symp., Usenix Assoc., 2005.
    • (2005) Proc. 14th Conf. Usenix Security Symp
    • Bhatkar, S.1    Sekar, R.2    DuVarney, D.C.3
  • 5
    • 84906818067 scopus 로고    scopus 로고
    • Where's the Feeb? The Effectiveness of Instruction Set Randomization
    • Usenix Assoc
    • A.N. Sovarel, D. Evans, and N. Paul, "Where's the Feeb? The Effectiveness of Instruction Set Randomization," Proc. 14th Conf. Usenix Security Symp., Usenix Assoc., 2005.
    • (2005) Proc. 14th Conf. Usenix Security Symp
    • Sovarel, A.N.1    Evans, D.2    Paul, N.3
  • 9
    • 32344441314 scopus 로고    scopus 로고
    • StackGuard: Simple Stack Smash Protection for GCC
    • C. Cowan and P. Wagle, "StackGuard: Simple Stack Smash Protection for GCC," Proc. GCC Developers Summit, 2003; www.gccsummit.org/2003.
    • (2003) Proc. GCC Developers Summit
    • Cowan, C.1    Wagle, P.2
  • 10
    • 0542409578 scopus 로고
    • Can Viruses Ever Be Useful?
    • H. Thimbleby, "Can Viruses Ever Be Useful?" Computers and Security, vol. 10, no. 2, 1991, pp. 111-114.
    • (1991) Computers and Security , vol.10 , Issue.2 , pp. 111-114
    • Thimbleby, H.1
  • 11
    • 18744376889 scopus 로고    scopus 로고
    • Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks
    • ACM Press
    • E.G. Barrantes et al., "Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS 03), ACM Press, 2003, pp. 281-289.
    • (2003) Proc. 10th ACM Conf. Computer and Comm. Security (CCS 03) , pp. 281-289
    • Barrantes, E.G.1
  • 13
    • 33745944184 scopus 로고    scopus 로고
    • Secure and Practical Defense against Code-Injection Attacks Using Software Dynamic Translation
    • ACM Press
    • W. Hu et al., "Secure and Practical Defense against Code-Injection Attacks Using Software Dynamic Translation," Proc. 2nd Int'l Conf Virtual Execution Environments, ACM Press, 2006, pp. 2-12.
    • (2006) Proc. 2nd Int'l Conf Virtual Execution Environments , pp. 2-12
    • Hu, W.1
  • 14
    • 4544257315 scopus 로고    scopus 로고
    • Link-Time Optimization of ARM Binaries
    • B. De Bus et al., "Link-Time Optimization of ARM Binaries," ACM SIGPLAN Notices, vol. 39, no. 7, 2004, pp. 211-220.
    • (2004) ACM SIGPLAN Notices , vol.39 , Issue.7 , pp. 211-220
    • De Bus, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.