2012
DOI: 10.1016/j.ijcip.2012.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Creating a cyber moving target for critical infrastructure applications using platform diversity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 62 publications
(25 citation statements)
references
References 11 publications
0
23
0
1
Order By: Relevance
“…Talent [11] is a framework for live-migrating critical applications across diverse platforms that has several design goals: i) diversity at the instruction set architecture level, ii) diversity at the operating system level, iii) preservation of the state of the application, including the execution state, open files and sockets, and iv) working with a general-purpose, system language such as C. While the analysis we present in this paper is applicable across a broad range of technologies, we notionally use Talent as our target system as it provides both temporal changes (periodic migrations) and diversity (multiple operating systems).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Talent [11] is a framework for live-migrating critical applications across diverse platforms that has several design goals: i) diversity at the instruction set architecture level, ii) diversity at the operating system level, iii) preservation of the state of the application, including the execution state, open files and sockets, and iv) working with a general-purpose, system language such as C. While the analysis we present in this paper is applicable across a broad range of technologies, we notionally use Talent as our target system as it provides both temporal changes (periodic migrations) and diversity (multiple operating systems).…”
Section: Related Workmentioning
confidence: 99%
“…One such paradigm is moving target (MT) defense based on dynamic platform techniques, which dynamically change the properties of a computing platform in order to complicate attacks [12]. These properties that are dynamically adjusted focus around: the instructions being executed [20,19,9,7] and their architecture [4], system and application memory [17,16,6,15], operating system (OS) distribution [11], and machine instance [14].…”
Section: Introductionmentioning
confidence: 99%
“…We have worked with stateless protocols, and thus, we have not needed to transfer state from real to emulated services. Transferring state is an additional complication, but has been addressed previously [10].…”
Section: Emulationmentioning
confidence: 99%
“…If there were no 9 See http://code.google.com/p/vmitools/ (accessed 9/20/12). 10 See http://code.google.com/p/volatility/ (accessed 9/20/12). differences between normal and emulated services, then the attacker would have access to the same information through either of those services.…”
Section: Cocooningmentioning
confidence: 99%
See 1 more Smart Citation