Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advantages, the beneficial effects of diversity in computing systems have been overlooked, specifically in the area of computer security. Several methods of achieving software diversity are discussed based on randomizations that respect the specified behavior of the program. Such randomization could potentially increase the robustness of software systems with minimal impact on convenience, usability, and efficiency. Randomization of the amount of memory allocated on a stack frame is shown to disrupt a simple buffer overflow attack. 1 Introduction: Diversit
A buffer overflow occurs during program execution when a fixed-size buffer has had too much data cop...
The goal of this research was to explore first principles associated with mixing of diverse implemen...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Abstract. The problem of defending software against tampering by a malicious host is not expected to...
The problem of defending software against tampering by a malicious host is not expected to be solved...
Although many have recognized that software monocultures are a major impediment to improving securit...
Early experiments with software diversity in the mid 1970's investigated N-version programming and r...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
The best efforts of the computer security community have not eliminated software with hidden attacka...
A buffer overflow occurs during program execution when a fixed-size buffer has had too much data cop...
The goal of this research was to explore first principles associated with mixing of diverse implemen...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Abstract. The problem of defending software against tampering by a malicious host is not expected to...
The problem of defending software against tampering by a malicious host is not expected to be solved...
Although many have recognized that software monocultures are a major impediment to improving securit...
Early experiments with software diversity in the mid 1970's investigated N-version programming and r...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
The best efforts of the computer security community have not eliminated software with hidden attacka...
A buffer overflow occurs during program execution when a fixed-size buffer has had too much data cop...
The goal of this research was to explore first principles associated with mixing of diverse implemen...
Due to copyright restrictions, the access to the full text of this article is only available via sub...