Moving Target Defense: Creating Asymmetric Uncertainty for by Pratyusa K. Manadhata, Jeannette M. Wing (auth.), Sushil

By Pratyusa K. Manadhata, Jeannette M. Wing (auth.), Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang (eds.)

Moving aim safety: growing uneven Uncertainty for Cyber Threats used to be constructed by way of a gaggle of major researchers. It describes the basic demanding situations dealing with the learn group and identifies new promising resolution paths. relocating objective security that's influenced by means of the uneven bills borne through cyber defenders takes a bonus afforded to attackers and reverses it to virtue defenders. relocating aim safety is enabled by way of technical traits in recent times, together with virtualization and workload migration on commodity platforms, frequent and redundant community connectivity, guideline set and handle house structure randomization, just-in-time compilers, between different concepts. notwithstanding, many hard learn difficulties stay to be solved, comparable to the protection of virtualization infrastructures, safe and resilient suggestions to maneuver structures inside a virtualized atmosphere, automated diversification strategies, computerized how you can dynamically swap and deal with the configurations of platforms and networks, quantification of safety development, strength degradation and extra.

Moving goal safeguard: developing uneven Uncertainty for Cyber Threats is designed for complex -level scholars and researchers enthusiastic about machine technological know-how, and as a secondary textual content e-book or reference. pros operating during this box also will locate this e-book valuable.

Show description

Read Online or Download Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats PDF

Similar nonfiction_5 books

A handbook to Kant's Critique of pure reason

This publication used to be initially released sooner than 1923, and represents a replica of a massive old paintings, protecting a similar structure because the unique paintings. whereas a few publishers have opted to follow OCR (optical personality acceptance) know-how to the method, we think this results in sub-optimal effects (frequent typographical error, unusual characters and complicated formatting) and doesn't appropriately look after the historic personality of the unique artifact.

Roots of Wisdom: A Tapestry of Philosophical Traditions , Sixth Edition

ROOTS OF knowledge, 6th version, invitations scholars to discover common and present philosophical matters via a wealthy tapestry of views together with the information and traditions of guys and ladies from the West, Asia, Peoples of the Americas, and Africa. No different ebook deals such breadth of multicultural insurance coupled with a transparent, concise, and approachable writing sort.

FÉLIX J. PALMA - THE MAP OF TIME (ARC)

This is often a sophisticated Readers replica. .. Publicity/MarketingNational tv, radio, and print publicityBook membership fabrics on hand at SimonandSchuster. comSimonandSchuster. com per 30 days e-newsletter featureSimonandSchuster. com characteristic • on-line promotions and featuresOn sale June 28, 2011 • 978-1-4391-0272-5$26.

Extra resources for Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats

Example text

Shacham et al. introduced a more general form of this attack strategy known as return-oriented programming. Instead of relying on the functions provided intentionally by libc, return-oriented programming exploits fragments of code found in the binary (including fragments that start in the middle of intended instructions) to provide a Turing-complete programming system without needing to inject any code. A recent exploit against Adobe Reader/Acrobat used return-oriented programming to circumvent ASLR in Windows 7 and Windows Vista [21].

In DSN, pages 505–514, 2002. 20. Pratyusa K. Manadhata. An Attack Surface Metric. PhD thesis, Carnegie Mellon University, December 2008. 21. Pratyusa K. Manadhata and Jeannette M. Wing. An attack surface metric. IEEE Transactions on Software Engineering, 99(PrePrints), 2010. 22. Gary McGraw. From the ground up: The DIMACS software security workshop. IEEE Security and Privacy, 1(2):59–66, 2003. 23. Miles A. McQueen, Wayne F. Boyer, Mark A. Flynn, and George A. Beitel. Time-tocompromise model for cyber risk reduction estimation.

Boston, MA, USA, 1998. 6. Virgil D. Gligor. Personal communication, 2008. 7. Seymour E. Goodman and Herbert S. Lin, editors. Toward a Safer and More Secure Cyberspace. The National Academics Press, 2007. 8. R. Gopalakrishna, E. Spafford, , and J. Vitek. Vulnerability likelihood: A probabilistic approach to software assurance. Technical Report 2005-06, CERIAS, Purdue Univeristy, 2005. 9. Y. Y. Haimes. Risk Modeling, Assessment, and Management. Wiley, 2004. 10. Curtis P. Haugtvedt, Paul M. Herr, and Frank R.

Download PDF sample

Rated 4.42 of 5 – based on 11 votes