Security and Science of Agility

作者: Patrick McDaniel , Srikanth V. Krishnamurthy , Iulian Neamtiu , Trent Jaeger , Thomas F. La Porta

DOI: 10.1145/2663474.2663476

关键词: Adversarial systemAndroid (operating system)Computer scienceComputer securityRisk analysis (engineering)Systems managementAlliance

摘要: Moving target defenses alter the environment in response to adversarial action and perceived threats. Such are a specific example of broader class system management techniques called agility. In its fullest generality, agility is any reasoned modification or functional, performance, security need. This paper details recently launched 10-year Cyber-Security Collaborative Research Alliance effort focused in-part on development new science agility, which moving central theme. this context, consortium seeks address questions when, what, how employ changes improve an environment, as well consider measure weigh effectiveness different approaches We discuss several fundamental challenges developing using MTD maneuvers, outline broad classes mechanisms that can be used implement them. conclude by detailing adaptively quarantine vulnerable code Android applications, ways comparing cost payout use.

参考文章(17)
Vikram Gupta, Srikanth V. Krishnamurthy, Michalis Faloutsos, Improving the Performance of TCP in the Presence of Interacting UDP Flows in Ad Hoc Networks Lecture Notes in Computer Science. pp. 64- 75 ,(2004) , 10.1007/978-3-540-24693-0_6
David von Oheimb, Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage Computer Security – ESORICS 2004. pp. 225- 243 ,(2004) , 10.1007/978-3-540-30108-0_14
V. Gupta, S. Krishnamurthy, M. Faloutsos, Denial of service attacks at the MAC layer in wireless ad hoc networks military communications conference. ,vol. 2, pp. 1118- 1123 ,(2002) , 10.1109/MILCOM.2002.1179634
Md. Tanzirul Azim, Iulian Neamtiu, Lisa M. Marvel, Towards self-healing smartphone software via automated patching automated software engineering. pp. 623- 628 ,(2014) , 10.1145/2642937.2642955
George Papageorgiou, John Gasparis, Srikanth V. Krishnamurthy, Ramesh Govindan, Tom La Porta, Resource thrifty secure mobile video transfers on open WiFi networks conference on emerging network experiment and technology. pp. 333- 344 ,(2013) , 10.1145/2535372.2535389
M.G. Reed, P.F. Syverson, D.M. Goldschlag, Anonymous connections and onion routing IEEE Journal on Selected Areas in Communications. ,vol. 16, pp. 482- 494 ,(1998) , 10.1109/49.668972
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Krishnamurthy, Routing amid Colluding Attackers international conference on network protocols. pp. 184- 193 ,(2007) , 10.1109/ICNP.2007.4375849
Ari Juels, Ronald L. Rivest, Honeywords: making password-cracking detectable computer and communications security. pp. 145- 160 ,(2013) , 10.1145/2508859.2516671
Laurent Eschenauer, Virgil D. Gligor, A key-management scheme for distributed sensor networks Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 41- 47 ,(2002) , 10.1145/586110.586117
P.F. Syverson, D.M. Goldschlag, M.G. Reed, Anonymous connections and onion routing ieee symposium on security and privacy. pp. 44- 54 ,(1997) , 10.1109/SECPRI.1997.601314