International audienceWhen there are either design or implementation flaws, a homogeneous architecture is likely to be disrupted entirely by a single attack (e.g., a worm) that exploits its vulnerability. Following the survivability through heterogeneity philosophy, we present a novel approach to improving survivability of networked systems by adopting the technique of software diversity. Specifically, we design an efficient algorithm to select and deploy a set of off-the-shelf software to hosts in a networked system, such that the number and types of vulnerabilities presented on one host would be different from that on its neighboring nodes. In this way, we are able to contain a worm in an isolated “island”. This algorithm addresses softwa...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
Diversity is an important source of robustness in biological systems. Computers, by contrast, are no...
Diversity emerges as a critical concern that spans all activities in software engineering (from desi...
Abstract. When there are either design or implementation flaws, a ho-mogeneous architecture is likel...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
The best efforts of the computer security community have not eliminated software with hidden attacka...
Although many have recognized that software monocultures are a major impediment to improving securit...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Since sensor nodes are implemented in embedded computer systems, which do not have complicated hardw...
The goal of this research was to explore first principles associated with mixing of diverse implemen...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
Diversity is an important source of robustness in biological systems. Computers, by contrast, are no...
Diversity emerges as a critical concern that spans all activities in software engineering (from desi...
Abstract. When there are either design or implementation flaws, a ho-mogeneous architecture is likel...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
The best efforts of the computer security community have not eliminated software with hidden attacka...
Although many have recognized that software monocultures are a major impediment to improving securit...
Network diversity has been widely recognized as an effective defense strategy to mitigate the spread...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Cyber crime is a significant threat to modern society that will continue to grow as technology is in...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Since sensor nodes are implemented in embedded computer systems, which do not have complicated hardw...
The goal of this research was to explore first principles associated with mixing of diverse implemen...
Due to high homogeneity of current network devices, a network is compromised if one node in the netw...
Diversity is an important source of robustness in biological systems. Computers, by contrast, are no...
Diversity emerges as a critical concern that spans all activities in software engineering (from desi...