The multiple facets of software diversity: Recent developments in year 2000 and beyond

B Baudry, M Monperrus - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Early experiments with software diversity in the mid 1970s investigated N-version
programming and recovery blocks to increase the reliability of embedded systems. Four …

Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model

RP Tracy, H Barrett, GM Catlin - US Patent 6,983,221, 2006 - Google Patents
A computer-assisted system, medium and method of providing a risk assessment of a target
system. The method includes providing one or more test requirements categories …

Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment

RP Tracy, H Barrett, GM Catlin - US Patent 6,980,927, 2005 - Google Patents
Viding a risk assessment of a target System. The method includes electronically Scanning,
on a predetermined basis, hardware and/or Software characteristics of components within a …

COTS diversity based intrusion detection and application to web servers

E Totel, F Majorczyk, L Me - Recent Advances in Intrusion Detection: 8th …, 2006 - Springer
It is commonly accepted that intrusion detection systems (IDS) are required to compensate
for the insufficient security mechanisms that are available on computer systems and …

Automatic software diversity in the light of test suites

B Baudry, S Allier, M Rodriguez-Cancio… - arXiv preprint arXiv …, 2015 - arxiv.org
A few works address the challenge of automating software diversification, and they all share
one core idea: using automated test suites to drive diversification. However, there is is lack …

Practical solution for location privacy in mobile IPv6

SG Choi, K Kim, BG Kim - International Workshop on Information Security …, 2003 - Springer
Mobile IP (MIP) enables the Mobile Node (MN) to move around without loosing their
transport-layer connectivity by using resources in the foreign domain network. MIP is …

[PDF][PDF] Experiments on cots diversity as an intrusion detection and tolerance mechanism

F Majorczyk, É Totel, L Mé - Proceedings of the First Workshop on Recent …, 2007 - di.fc.ul.pt
ABSTRACT COTS (Components-Off-The-Shelf) diversity has been proposed by many recent
projects to ensure intrusion detection and tolerance. However using COTS in a N-version …

Détection d'intrusions comportementale par diversification de COTS: application au cas des serveurs web

F Majorczyk - 2008 - theses.hal.science
L'informatique et en particulier l'Internet jouent un rôle grandissant dans notre société. Un
grand nombre d'applications critiques d'un point de vue de leur sécurité sont déployées …

A dependable intrusion detection architecture based on agreement services

M Hurfin, JP Le Narzul, F Majorczyk, L Mé… - Symposium on Self …, 2006 - Springer
In this paper, we show that the use of diversified COTS servers allows to detect intrusions
corresponding to unknown attacks. We present an architecture that ensures both …

Intrusion-tolerant system design for web server survivability

DS Choi, EG Im, CW Lee - … : 4th International Workshop, WISA 2003 Jeju …, 2004 - Springer
Internet becomes more and more popular, and most companies and institutes use web
services for e-business to promote their business. As results, Internet and web services …