메뉴 건너뛰기




Volumn 12, Issue 2, 2014, Pages 16-26

Finding focus in the blur of moving-target techniques

Author keywords

ASLR; Cyber moving target; Dynamic data; Dynamic network; Dynamic platform; Dynamic runtime environment; Dynamic software; Moving target; Reconnaissance

Indexed keywords

ELECTRICAL ENGINEERING;

EID: 84899526686     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2013.137     Document Type: Article
Times cited : (154)

References (15)
  • 1
    • 84899577662 scopus 로고    scopus 로고
    • Cybersecurity game-change research & development recommendations
    • May
    • "Cybersecurity Game-Change Research & Development Recommendations," Networking and Information Technology Research and Development Program, May 2010; www.nitrd.gov/pubs/ CSIAIWG%20Cybersecurity%20GameChangeRD%20Recommendations20100513.pdf.
    • (2010) Networking and Information Technology Research and Development Program
  • 2
    • 84863936248 scopus 로고    scopus 로고
    • Command and control requirements for moving-Target defense
    • M. Carvalho et al., "Command and Control Requirements for Moving-Target Defense," IEEE Intelligent Systems, vol. 27, no. 3, 2012, pp. 79-85.
    • (2012) IEEE Intelligent Systems , vol.27 , Issue.3 , pp. 79-85
    • Carvalho, M.1
  • 7
    • 0742269305 scopus 로고    scopus 로고
    • Resilient self-organizing overlay networks for security update delivery
    • J. Li, P. Reiher, and G.J. Popek, "Resilient Self-Organizing Overlay Networks for Security Update Delivery," IEEE J. Selected Areas in Communications, vol. 22, no. 1, 2004, pp. 189-202.
    • (2004) IEEE J. Selected Areas in Communications , vol.22 , Issue.1 , pp. 189-202
    • Li, J.1    Reiher, P.2    Popek, G.J.3
  • 8
    • 84858289309 scopus 로고    scopus 로고
    • Creatinga cyber moving target for critical infrastructure applications using platform diversity
    • H. Okhravi et al., "Creating a Cyber Moving Target for Critical Infrastructure Applications Using Platform Diversity," Int'l J. Critical Infrastructure Protection, vol. 5, no. 1, 2012, pp. 30-39.
    • (2012) Int'l J. Critical Infrastructure Protection , vol.5 , Issue.1 , pp. 30-39
    • Okhravi, H.1
  • 9
    • 84886393009 scopus 로고    scopus 로고
    • N-variant systems: A secretless framework for security through diversity
    • B. Cox et al., "N-Variant Systems: A Secretless Framework for Security through Diversity," Proc. 15th Usenix Security Symp., 2006, pp. 105-120.
    • (2006) Proc. 15th Usenix Security Symp. , pp. 105-120
    • Cox, B.1
  • 12
    • 79957595816 scopus 로고    scopus 로고
    • Runtime defense against code injection attacks using replicated execution
    • B. Salamat et al., "Runtime Defense against Code Injection Attacks Using Replicated Execution," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 4, 2011, pp. 588-601.
    • (2011) IEEE Trans. Dependable and Secure Computing , vol.8 , Issue.4 , pp. 588-601
    • Salamat, B.1
  • 13
    • 84856746279 scopus 로고    scopus 로고
    • GenProg: A generic method for automatic software repair
    • C. Le Goues et al., "GenProg: A Generic Method for Automatic Software Repair," IEEE Trans. Software Eng., vol. 38, no. 1, 2012, pp. 54-72.
    • (2012) IEEE Trans. Software Eng. , vol.38 , Issue.1 , pp. 54-72
    • Le Goues, C.1
  • 14
    • 0023997325 scopus 로고
    • Data diversity: An approach to software fault tolerance
    • P.E. Ammann and J.C. Knight, "Data Diversity: An Approach to Software Fault Tolerance," IEEE Trans. Computers, vol. 37, no. 4, 1988, pp. 418-425.
    • (1988) IEEE Trans. Computers , vol.37 , Issue.4 , pp. 418-425
    • Ammann, P.E.1    Knight, J.C.2
  • 15
    • 70350684106 scopus 로고    scopus 로고
    • tech. report MSRTR-2008-120, Microsoft Research, Sept.
    • C. Cadar et al., Data Randomization, tech. report MSRTR- 2008-120, Microsoft Research, Sept. 2008.
    • (2008) Data Randomization
    • Cadar, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.