Multi-variant program execution is an application of n-version programming, in which several slightly different instances of the same program are executed in lockstep on a multiproces-sor. These variants are created in such a way that they be-have identically under “normal ” operation and diverge when “out of specification ” events occur, which may be indica-tive of attacks. This paper assess the effectiveness of dif-ferent code variation techniques to address different classes of vulnerabilities. In choosing a variant or combination of variants, security demands need to be balanced against run-time overhead. Our study indicates that a good combination of variations when running two variants is to choose one of instruction set randomization...
Part 3: Attacks to Software and Network SystemsInternational audienceWe present a generic framework ...
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilien...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Abstract—The number and complexity of attacks on computer systems are increasing. This growth necess...
We present an architectural framework for systematically using automated diversity to provide high a...
N-Variant Execution (NVX) systems utilize artificial diversity techniques to enhance software securi...
Abstract. The problem of defending software against tampering by a malicious host is not expected to...
The problem of defending software against tampering by a malicious host is not expected to be solved...
Memory error exploits rank among the most serious security threats. Of the plethora of memory error ...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
International audienceThe predictability of program execution provides attackers a rich source of kn...
The predictability of program execution provides attackers a rich source of knowledge who can exploi...
N-version programming has been proposed as a method of incorporating fault tolerance into software. ...
Software design technology has made some considerable progress in the last decades, but this has bee...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Part 3: Attacks to Software and Network SystemsInternational audienceWe present a generic framework ...
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilien...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Abstract—The number and complexity of attacks on computer systems are increasing. This growth necess...
We present an architectural framework for systematically using automated diversity to provide high a...
N-Variant Execution (NVX) systems utilize artificial diversity techniques to enhance software securi...
Abstract. The problem of defending software against tampering by a malicious host is not expected to...
The problem of defending software against tampering by a malicious host is not expected to be solved...
Memory error exploits rank among the most serious security threats. Of the plethora of memory error ...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
International audienceThe predictability of program execution provides attackers a rich source of kn...
The predictability of program execution provides attackers a rich source of knowledge who can exploi...
N-version programming has been proposed as a method of incorporating fault tolerance into software. ...
Software design technology has made some considerable progress in the last decades, but this has bee...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Part 3: Attacks to Software and Network SystemsInternational audienceWe present a generic framework ...
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilien...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...