We present GHUMVEE, a multi-variant execution engine for software intrusion detection. GHUMVEE transparently executes and monitors diversified replicae of processes to thwart attacks relying on a predictable, single data layout. Unlike existing tools, GHUMVEE's interventions in the process' execution are not limited to system call invocations. Because of that design decision, GHUMVEE can handle complex, multi-threaded real-life programs that display non-deterministic behavior as a result of non-deterministic thread scheduling and as a result of pointer-value dependent behavior. This capability is demonstrated on GUI programs from the Gnome and KDE desktop environments. © 2013 Springer-Verlag.status: publishe
With the increased use of web technologies, microservices, and Application Programming Interface (AP...
L’étude réalisée durant cette thèse porte sur la sécurité des applications distribuées. Bien que les...
International audienceAlthough security issues are now addressed during the development process of d...
We present GHUMVEE, a multi-variant execution engine for software intrusion detection. GHUMVEE trans...
Abstract—The number and complexity of attacks on computer systems are increasing. This growth necess...
The Anomaly Processor in Hardware for Intrusion Detection (APHID) is a step forward in the field of ...
Multi-Variant Execution Environments (MVEEs) are a powerful tool for protecting legacy software agai...
N-Variant Execution (NVX) systems utilize artificial diversity techniques to enhance software securi...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
University of Technology Sydney. Faculty of Engineering and Information Technology.Host-based intrus...
Post-Deployment runtime verification (RV) has recently emerged as a complementary technology to exte...
Abstract: Intrusion detection systems have proved to be an effective instrument for protecting compu...
As high-speed networks are becoming commonplace, it is increas-ingly challenging to prevent the atta...
In the past years, researchers have been focusingon applying information flow security to web applic...
With the increased use of web technologies, microservices, and Application Programming Interface (AP...
L’étude réalisée durant cette thèse porte sur la sécurité des applications distribuées. Bien que les...
International audienceAlthough security issues are now addressed during the development process of d...
We present GHUMVEE, a multi-variant execution engine for software intrusion detection. GHUMVEE trans...
Abstract—The number and complexity of attacks on computer systems are increasing. This growth necess...
The Anomaly Processor in Hardware for Intrusion Detection (APHID) is a step forward in the field of ...
Multi-Variant Execution Environments (MVEEs) are a powerful tool for protecting legacy software agai...
N-Variant Execution (NVX) systems utilize artificial diversity techniques to enhance software securi...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
University of Technology Sydney. Faculty of Engineering and Information Technology.Host-based intrus...
Post-Deployment runtime verification (RV) has recently emerged as a complementary technology to exte...
Abstract: Intrusion detection systems have proved to be an effective instrument for protecting compu...
As high-speed networks are becoming commonplace, it is increas-ingly challenging to prevent the atta...
In the past years, researchers have been focusingon applying information flow security to web applic...
With the increased use of web technologies, microservices, and Application Programming Interface (AP...
L’étude réalisée durant cette thèse porte sur la sécurité des applications distribuées. Bien que les...
International audienceAlthough security issues are now addressed during the development process of d...