Software Deception Steering through Version Emulation.

作者: Subbarao Kambhampati , Kevin W. Hamlen , Adam Doupé , Jiyong Jang , Sailik Sengupta

DOI: 10.24251/HICSS.2021.243

关键词: EmulationDeceptionComputer securitySecurity engineeringGame theorySoftware security assuranceSoftwareComputer science

摘要:

参考文章(25)
Patrick McDaniel, Srikanth V. Krishnamurthy, Iulian Neamtiu, Trent Jaeger, Thomas F. La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa Marvel, Ananthram Swami, Prasant Mohapatra, Security and Science of Agility computer and communications security. pp. 13- 19 ,(2014) , 10.1145/2663474.2663476
David Roundy, Darcs Proceedings of the 2005 ACM SIGPLAN workshop on Haskell - Haskell '05. pp. 1- 4 ,(2005) , 10.1145/1088348.1088349
Babak Salamat, Todd Jackson, Andreas Gal, Michael Franz, Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space european conference on computer systems. pp. 33- 46 ,(2009) , 10.1145/1519065.1519071
J. McHugh, W.L. Fithen, W.A. Arbaugh, Windows of vulnerability: a case study analysis IEEE Computer. ,vol. 33, pp. 52- 59 ,(2000) , 10.1109/2.889093
Samuel T. Trassare, Robert Beverly, David Alderson, A Technique for Network Topology Deception MILCOM 2013 - 2013 IEEE Military Communications Conference. pp. 1795- 1800 ,(2013) , 10.1109/MILCOM.2013.303
Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser, From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation computer and communications security. pp. 942- 953 ,(2014) , 10.1145/2660267.2660329
Thomas E. Carroll, Michael Crouse, Errin W. Fulp, Kenneth S. Berenhaut, Analysis of network address shuffling as a moving target defense international conference on communications. pp. 701- 706 ,(2014) , 10.1109/ICC.2014.6883401
Panos Kampanakis, Harry Perros, Tsegereda Beyene, SDN-based solutions for Moving Target Defense network protection world of wireless mobile and multimedia networks. pp. 1- 6 ,(2014) , 10.1109/WOWMOM.2014.6918979
Janusz Marecki, Praveen Paruchuri, Jonathan P. Pearce, Sarit Kraus, Fernando Ordonez, Milind Tambe, Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games adaptive agents and multi-agents systems. pp. 895- 902 ,(2008) , 10.5555/1402298.1402348
Richard Lippmann, Seth Webster, Douglas Stetson, The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection recent advances in intrusion detection. pp. 307- 326 ,(2002) , 10.1007/3-540-36084-0_17