Abstract—The software monoculture favors attackers over defenders, since it makes all target environments appear similar. Code-reuse attacks, for example, rely on target hosts running identical software. Attackers use this assumption to their advantage by automating parts of creating an attack. This article presents large-scale automated software diversification as a means to shore up this vulnerability implied by our software monoculture. Besides describing an industrial-strength implementation of automated software diversity, we introduce methods to objectively measure the effectiveness of diversity in general, and its potential to eliminate code-reuse attacks in particular. Index Terms—Biologically-inspired defenses, artificial software ...
Diversity is an important and valuable concept that has been adopted in many fields to reduce correl...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Code-reuse attacks are notoriously hard to defeat, and many current solutions to the problem focus o...
Although many have recognized that software monocultures are a major impediment to improving securit...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Context Software diversity, self-modification, and obfuscation have many applications in software se...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
The predictability of program execution provides attackers a rich source of knowledge who can exploi...
Diversity is an important source of robustness in biological systems. Computers, by contrast, are no...
International audienceThe predictability of program execution provides attackers a rich source of kn...
Early experiments with software diversity in the mid 1970's investigated N-version programming and r...
Diversity is an important and valuable concept that has been adopted in many fields to reduce correl...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Code-reuse attacks are notoriously hard to defeat, and many current solutions to the problem focus o...
Although many have recognized that software monocultures are a major impediment to improving securit...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Context Software diversity, self-modification, and obfuscation have many applications in software se...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
The predictability of program execution provides attackers a rich source of knowledge who can exploi...
Diversity is an important source of robustness in biological systems. Computers, by contrast, are no...
International audienceThe predictability of program execution provides attackers a rich source of kn...
Early experiments with software diversity in the mid 1970's investigated N-version programming and r...
Diversity is an important and valuable concept that has been adopted in many fields to reduce correl...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...