Proceedings of the 2014 International Symposium on Software Testing and Analysis 2014
DOI: 10.1145/2610384.2610415
|View full text |Cite
|
Sign up to set email alerts
|

Tailored source code transformations to synthesize computationally diverse program variants

Abstract: The predictability of program execution provides attackers a rich source of knowledge who can exploit it to spy or remotely control the program. Moving target defense addresses this issue by constantly switching between many diverse variants of a program, which reduces the certainty that an attacker can have about the program execution. The effectiveness of this approach relies on the availability of a large number of software variants that exhibit different executions. However, current approaches rely on the … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
23
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 27 publications
(24 citation statements)
references
References 28 publications
0
23
0
Order By: Relevance
“…For example, an approach synthesizing program variants automatically has been developed and proposed to increase system security [33]. At a given time, this technique randomly selects one program from a population of computationally diverse program variants (Sosies) to make it hard for hackers to focus on program features to attack.…”
Section: Discussionmentioning
confidence: 99%
“…For example, an approach synthesizing program variants automatically has been developed and proposed to increase system security [33]. At a given time, this technique randomly selects one program from a population of computationally diverse program variants (Sosies) to make it hard for hackers to focus on program features to attack.…”
Section: Discussionmentioning
confidence: 99%
“…Using the diversification technique described in [46], we synthesized 20 sosies of the MdMS workers. These sosies are used to execute the application with a varying number of back-ends (from 4 to 10).…”
Section: Methodsmentioning
confidence: 99%
“…This proactive diversification of MdMS targets safety [44] and security [45] purposes. In particular, we have used our recent technique for the automatic synthesis of sosie programs [46] in order to automatically diversify the workers. A sosie is a variant of a program that exhibits the same functionality (passes the same test suite) and a diverse computation (different control or data flow).…”
Section: Use Case Presentationmentioning
confidence: 99%
“…Schulte et al touch on the ways in which the software mutational robustness they document might be employed to generate software diversity. Their method has already been employed and cited during the time interval between the online publication of their paper and the printed version [4].Our second paper on robustness returns to the original context in which robustness was conceived: homeostasis, the organism as a robust dynamical system. The paper "Self-repair ability of evolved self-assembling systems in cellular automata" [13] by CanÖztürkeri and Colin Johnson investigates self-repair, a form of robustness in which systems are "able to reconfigure themselves following disruptions to bring them back into a defined normal state."…”
mentioning
confidence: 99%
“…Schulte et al touch on the ways in which the software mutational robustness they document might be employed to generate software diversity. Their method has already been employed and cited during the time interval between the online publication of their paper and the printed version [4].…”
mentioning
confidence: 99%