메뉴 건너뛰기




Volumn , Issue , 2014, Pages 149-159

Tailored source code transformations to synthesize computationally diverse program variants

Author keywords

Computation diversity; Program sosie; Program transformation; Software diversity

Indexed keywords

COMPUTER PROGRAMMING; COSINE TRANSFORMS; NETWORK SECURITY; OPEN SOURCE SOFTWARE;

EID: 84942805875     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2610384.2610415     Document Type: Conference Paper
Times cited : (23)

References (31)
  • 5
    • 0027684663 scopus 로고
    • Operating system protection through program evolution
    • F. B. Cohen. Operating system protection through program evolution. Computers & Security, 12(6):565-584, 1993.
    • (1993) Computers & Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.B.1
  • 7
    • 0017959155 scopus 로고
    • Hints on test data selection: Help for the practicing programmer
    • R. A. DeMillo, R. J. Lipton, and F. G. Sayward. Hints on test data selection: Help for the practicing programmer. Computer, 11(4):34-41, 1978.
    • (1978) Computer , vol.11 , Issue.4 , pp. 34-41
    • De Millo, R.A.1    Lipton, R.J.2    Sayward, F.G.3
  • 8
    • 0032256307 scopus 로고    scopus 로고
    • Generating diverse software versions with genetic programming: An experimental study
    • R. Feldt. Generating diverse software versions with genetic programming: An experimental study. IEE Proceedings-Software, 145(6):228-236, 1998.
    • (1998) IEE Proceedings-Software , vol.145 , Issue.6 , pp. 228-236
    • Feldt, R.1
  • 12
    • 78751541482 scopus 로고    scopus 로고
    • E unibus pluram: Massive-scale software diversity as a defense mechanism
    • ACM
    • M. Franz. E unibus pluram: massive-scale software diversity as a defense mechanism. In Proceedings of the 2010 workshop on New security paradigms, pages 7-16. ACM, 2010.
    • (2010) Proceedings of the 2010 Workshop on New Security Paradigms , pp. 7-16
    • Franz, M.1
  • 13
    • 0038108620 scopus 로고    scopus 로고
    • Motivation of software developers in open source projects: An internet-based survey of contributors to the linux kernel
    • G. Hertel, S. Niedner, and S. Herrmann. Motivation of software developers in open source projects: An internet-based survey of contributors to the linux kernel. Research policy, 32(7):1159-1177, 2003.
    • (2003) Research Policy , vol.32 , Issue.7 , pp. 1159-1177
    • Hertel, G.1    Niedner, S.2    Herrmann, S.3
  • 16
    • 85008264009 scopus 로고    scopus 로고
    • Automatic mining of functionally equivalent code fragments via random testing
    • ACM
    • L. Jiang and Z. Su. Automatic mining of functionally equivalent code fragments via random testing. In Proc. of Int. Symp. on Software Testing and Analysis, pages 81-92. ACM, 2009.
    • (2009) Proc. of Int. Symp. on Software Testing and Analysis , pp. 81-92
    • Jiang, L.1    Su, Z.2
  • 22
    • 84994137883 scopus 로고    scopus 로고
    • A critical review of \automatic patch generation learned from human-written patches: An essay on the problem statement and the evaluation of automatic software repair
    • Hyderabab, India
    • M. Monperrus. A critical review of \automatic patch generation learned from human-written patches": An essay on the problem statement and the evaluation of automatic software repair. In Proc. of the Int. Conf on Software Engineering (ICSE), Hyderabab, India, 2014.
    • (2014) Proc. of the Int. Conf on Software Engineering (ICSE)
    • Monperrus, M.1
  • 24
    • 80051922262 scopus 로고    scopus 로고
    • Detecting anomalies in the order of equally-typed method arguments
    • M. Pradel and T. R. Gross. Detecting anomalies in the order of equally-typed method arguments. In Proceedings of ISSTA, pages 232-242, 2011.
    • (2011) Proceedings of ISSTA , pp. 232-242
    • Pradel, M.1    Gross, T.R.2
  • 25
    • 84863913620 scopus 로고    scopus 로고
    • Manipulating program functionality to eliminate security vulnerabilities
    • Springer
    • M. Rinard. Manipulating program functionality to eliminate security vulnerabilities. In Moving Target Defense, pages 109-115. Springer, 2011.
    • (2011) Moving Target Defense , pp. 109-115
    • Rinard, M.1
  • 29
    • 33745650701 scopus 로고    scopus 로고
    • Cots diversity based intrusion detection and application to web servers
    • Springer
    • E. Totel, F. Majorczyk, and L. Me. Cots diversity based intrusion detection and application to web servers. In Recent Advances in Intrusion Detection, pages 43-62. Springer, 2006.
    • (2006) Recent Advances in Intrusion Detection , pp. 43-62
    • Totel, E.1    Majorczyk, F.2    Me, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.