This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience, of software. diversification against collusion attacks. Such attacks require a tool to match corresponding program fragments in different, diversified program versions. The proposed technique limits the types of instructions occurring in a program to the, most frequently occurring types; by replacing the infrequently used types as much as possible by more frequently used ones. As such, this technique, when combined with diversification techniques. reduces the number of easily matched code fragments. The proposed technique is evaluated against a powerful diversification tool for Intel's x86 and an optimized matching process on a number of ...
Part 3: Attacks to Software and Network SystemsInternational audienceWe present a generic framework ...
The use of diversity and redundancy in the security do-main is an interesting approach to prevent or...
International audienceThe predictability of program execution provides attackers a rich source of kn...
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilien...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Code-reuse attacks are notoriously hard to defeat, and many current solutions to the problem focus o...
Despite the variety of choices regarding hardware and software, to date a large number of computer s...
Context Software diversity, self-modification, and obfuscation have many applications in software se...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Artificial Software Diversity is a well-established method to increase security of computer systems ...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
Abstract—We explore software diversity as a defense against side-channel attacks by dynamically and ...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
The predictability of program execution provides attackers a rich source of knowledge who can exploi...
Part 3: Attacks to Software and Network SystemsInternational audienceWe present a generic framework ...
The use of diversity and redundancy in the security do-main is an interesting approach to prevent or...
International audienceThe predictability of program execution provides attackers a rich source of kn...
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilien...
Software immunity through diversity is a promising research direction. Address Space Layout Randomi...
Code-reuse attacks are notoriously hard to defeat, and many current solutions to the problem focus o...
Despite the variety of choices regarding hardware and software, to date a large number of computer s...
Context Software diversity, self-modification, and obfuscation have many applications in software se...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Abstract—The idea of automatic software diversity is at least two decades old. The deficiencies of c...
Artificial Software Diversity is a well-established method to increase security of computer systems ...
Abstract—The software monoculture favors attackers over defenders, since it makes all target environ...
Abstract—We explore software diversity as a defense against side-channel attacks by dynamically and ...
Software systems often share common vulnerabilities that allow a single attack to compromise large n...
The predictability of program execution provides attackers a rich source of knowledge who can exploi...
Part 3: Attacks to Software and Network SystemsInternational audienceWe present a generic framework ...
The use of diversity and redundancy in the security do-main is an interesting approach to prevent or...
International audienceThe predictability of program execution provides attackers a rich source of kn...