N-Variant Execution (NVX) systems utilize artificial diversity techniques to enhance software security. The general idea is to run multiple different variants of the same program alongside each other while monitoring their run-time behavior. If a malicious input causes the execution paths of the diversified variants to diverge, the monitor can detect divergences, e.g. at the system call level, and take defensive action.Several NVX systems have been proposed over the last two decades, providing different security/performance characteristics. In general, security-oriented NVX systems greatly degrade performance, while high performance NVX systems have two disadvantages; they significantly increase the size of the Trusted Computing Base (TCB) ...
Early experiments with software diversity in the mid 1970s investigated N-version programming and re...
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilien...
Software updates are an integral part of the software development and maintenance process, but unfor...
N-Variant Execution (NVX) systems utilize artificial diversity techniques to enhance software securi...
We present an architectural framework for systematically using automated diversity to provide high a...
Multi-variant program execution is an application of n-version programming, in which several slightl...
With the widespread availability of multi-core processors, running multiple diversified variants or ...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Abstract—The number and complexity of attacks on computer systems are increasing. This growth necess...
With the widespread availability of multi-core processors, running multiple diversified variants or ...
Memory error exploits rank among the most serious security threats. Of the plethora of memory error ...
Kernel information leak vulnerabilities are a major security threat to production systems. Attackers...
Abstract. When there are either design or implementation flaws, a ho-mogeneous architecture is likel...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Early experiments with software diversity in the mid 1970s investigated N-version programming and re...
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilien...
Software updates are an integral part of the software development and maintenance process, but unfor...
N-Variant Execution (NVX) systems utilize artificial diversity techniques to enhance software securi...
We present an architectural framework for systematically using automated diversity to provide high a...
Multi-variant program execution is an application of n-version programming, in which several slightl...
With the widespread availability of multi-core processors, running multiple diversified variants or ...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Abstract—The number and complexity of attacks on computer systems are increasing. This growth necess...
With the widespread availability of multi-core processors, running multiple diversified variants or ...
Memory error exploits rank among the most serious security threats. Of the plethora of memory error ...
Kernel information leak vulnerabilities are a major security threat to production systems. Attackers...
Abstract. When there are either design or implementation flaws, a ho-mogeneous architecture is likel...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Early experiments with software diversity in the mid 1970s investigated N-version programming and re...
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilien...
Software updates are an integral part of the software development and maintenance process, but unfor...