Injecting heterogeneity through protocol randomization (2007)

by Li Zhuang , J. Doug Tygar , Rachna Dhamija , Computer Science Division
Venue:0. We obtain Ui = M − c . Because c− bc � � pL = bc b − pL
Citations:2 - 0 self

Active Bibliography

RandSys: Thwarting Code Injection Attacks . . . – Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang, Roussi Roussev
Orchestra: A User Space Multi-Variant Execution Environment – Babak Salamat, Todd Jackson, Andreas Gal, Michael Franz
1 Intrusion-Resilient Middleware Design and Validation – Paulo Veríssimo , Miguel Correia, Nuno Neves, Paulo Sousa
101 Efficient Techniques for Comprehensive Protection from Memory Error Exploits – Sandeep Bhatkar, R. Sekar, Daniel C. DuVarney - 2005
11 Proactive Obfuscation – Tom Roeder, Fred B. Schneider
Review of the state of the art (in Security and Dependability Monitoring and Recovery) – G. Spanoudakis, C. Kloukinas, T. Tsigritis, K. Androutsopoulos, C. Ballas, Domenico Presenza - 2006
Introduction to Foundations of Security Protocols – R. Ramanujam, S. P. Suresh
31 Context Sensitive Anomaly Monitoring of Process Control Flow To Detect Mimicry Attacks and Impossible Paths – Haizhi Xu, Wenliang Du, Steve J. Chapin - 2004
10 Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code – Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin - 2012
3 Orthrus: Efficient Software Integrity Protection on Multi-Cores – Ruirui Huang, Daniel Y. Deng, G. Edward Suh
IT Monoculture The Monoculture Risk Put into Context – Fred B, Kenneth, P. Birman
21 Independence from obfuscation: A semantic framework for diversity – Riccardo Pucella, Fred B. Schneider - 2006
1 Taxonomy and Effectiveness of Worm Defense Strategies – David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Song - 2005
5 Sting: An End-to-End Self-healing System for Defending against Zero-day Worm Attacks on Commodity Software – James Newsome, David Brumley, Dawn Song - 2005
Design Space and Analysis of Worm Defense Strategies – unknown authors
13 Design space and analysis of worm defense strategies – David Brumley, Li-hao Liu, Pongsin Poosankam, Dawn Song - 2006
5 Polymorphing Software by Randomizing Data Structure Layout – Zhiqiang Lin, Ryan D. Riley, Dongyan Xu
4 RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization – Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-min Wang - 2007
14 Protecting against unexpected system calls – C. M. Linn, M. Rajagopalan, S. Baker, C. Collberg, S. K. Debray, J. H. Hartman - 2005