SoK: Automated Software Diversity

@article{Larsen2014SoKAS,
  title={SoK: Automated Software Diversity},
  author={Per Larsen and Andrei Homescu and Stefan Brunthaler and Michael Franz},
  journal={2014 IEEE Symposium on Security and Privacy},
  year={2014},
  pages={276-291}
}
The idea of automatic software diversity is at least two decades old. The deficiencies of currently deployed defenses and the transition to online software distribution (the "App store" model) for traditional and mobile computers has revived the interest in automatic software diversity. Consequently, the literature on diversity grew by more than two dozen papers since 2008. Diversity offers several unique properties. Unlike other defenses, it introduces uncertainty in the target. Precise… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 151 CITATIONS, ESTIMATED 88% COVERAGE

Algorithm Diversity for Resilient Systems

VIEW 5 EXCERPTS
CITES METHODS, RESULTS & BACKGROUND
HIGHLY INFLUENCED

Compiler-Assisted Code Randomization

  • 2018 IEEE Symposium on Security and Privacy (SP)
  • 2018
VIEW 10 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution

  • 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
  • 2018
VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A Tutorial on Software

VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement

VIEW 7 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

In-memory fuzzing for binary code similarity analysis

  • 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)
  • 2017
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

C-FLAT: Control-Flow Attestation for Embedded Systems Software

  • ACM Conference on Computer and Communications Security
  • 2016
VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Detection of Intrusions and Malware, and Vulnerability Assessment

Magnus Almgren, Vincenzo Gulisano, Federico Maggi
  • Lecture Notes in Computer Science
  • 2015
VIEW 9 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2012
2019

CITATION STATISTICS

  • 28 Highly Influenced Citations

  • Averaged 27 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-10 OF 69 REFERENCES

Security through Diversity: Are We There Yet?

  • IEEE Security & Privacy
  • 2014
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Operating system protection through program evolution

  • Computers & Security
  • 1992
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Hacking Blind

  • 2014 IEEE Symposium on Security and Privacy
  • 2014
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization

  • 2013 IEEE Symposium on Security and Privacy
  • 2013
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Profile-guided automated software diversity

  • Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)
  • 2013
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

ILR: Where'd My Gadgets Go?

  • 2012 IEEE Symposium on Security and Privacy
  • 2012
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Retargetable and reconfigurable software dynamic translation

  • International Symposium on Code Generation and Optimization, 2003. CGO 2003.
  • 2003
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…