An architecture a day keeps the hacker away

  title={An architecture a day keeps the hacker away},
  author={David A. Holland and Ada T. Lim and Margo I. Seltzer},
  journal={SIGARCH Computer Architecture News},
System security as it is practiced today is a losing battle. In this paper, we outline a possible comprehensive solution for binary-based attacks, using virtual machines, machine descriptions, and randomization to achieve broad heterogeneity at the machine level. This heterogeneity increases the "cost" of broad-based binary attacks to a sufficiently high level that they cease to become feasible. The convergence of several recent technologies appears to make our approach achievable at a… CONTINUE READING
Highly Cited
This paper has 51 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 24 extracted citations

N-variant IC design: Methodology and applications

2008 45th ACM/IEEE Design Automation Conference • 2008
View 6 Excerpts
Highly Influenced

Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior

2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE) • 2016
View 1 Excerpt

On-the-Fly AES256 Decryption/Encryption for Trusted Cloud SQL DBS: Position Statement

2016 27th International Workshop on Database and Expert Systems Applications (DEXA) • 2016
View 1 Excerpt

Trusted cloud SQL DBS with on-the-fly AES decryption/encryption

2016 IEEE International Conference on Big Data (Big Data) • 2016
View 1 Excerpt

51 Citations

Citations per Year
Semantic Scholar estimates that this publication has 51 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.