Software monocultures are usually considered dangerous because their size and uniformity represent the potential for costly and widespread damage. The emerging concept of collaborative security provides the opportunity to re-examine the utility of software monoculture by exploiting the homogeneity and scale that typically define large software monocultures. Monoculture can be leveraged to improve an application‘s overall security and reliability. We introduce and explore the concept of Application Communities: collections of large numbers of independent instances of the same application. Members of an application community share the burden of monitoring for flaws and attacks, and notify the rest of the community when such are detected. Appr...
In the current software development market, many software is being developed using a copy-paste mech...
Security vulnerabilities are a major concern for software developers. Some vulnerabilities are simpl...
In considering new security paradigms, it is often worth-while to anticipate the direction and natur...
Artificial diversity is one method for mitigating the security risks of software monoculture. Introd...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
We propose a reactive approach for handling a wide variety of software failures, ranging from remote...
Although many have recognized that software monocultures are a major impediment to improving securit...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature...
The nature of cyberattacks has changed dramatically over the past few years. Encryption, polymorphis...
Although software-attack detection via dynamic taint analysis (DTA) supports high coverage of progra...
International audienceInternet applications are formed from reusable components all over the softwar...
Software systems, in particular component (or service) based software systems, are becoming highly d...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
In the current software development market, many software is being developed using a copy-paste mech...
Security vulnerabilities are a major concern for software developers. Some vulnerabilities are simpl...
In considering new security paradigms, it is often worth-while to anticipate the direction and natur...
Artificial diversity is one method for mitigating the security risks of software monoculture. Introd...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
We propose a reactive approach for handling a wide variety of software failures, ranging from remote...
Although many have recognized that software monocultures are a major impediment to improving securit...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature...
The nature of cyberattacks has changed dramatically over the past few years. Encryption, polymorphis...
Although software-attack detection via dynamic taint analysis (DTA) supports high coverage of progra...
International audienceInternet applications are formed from reusable components all over the softwar...
Software systems, in particular component (or service) based software systems, are becoming highly d...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
In the current software development market, many software is being developed using a copy-paste mech...
Security vulnerabilities are a major concern for software developers. Some vulnerabilities are simpl...
In considering new security paradigms, it is often worth-while to anticipate the direction and natur...