The multiple facets of software diversity: Recent developments in year 2000 and beyond
B Baudry, M Monperrus - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Early experiments with software diversity in the mid 1970s investigated N-version
programming and recovery blocks to increase the reliability of embedded systems. Four …
programming and recovery blocks to increase the reliability of embedded systems. Four …
Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model
RP Tracy, H Barrett, GM Catlin - US Patent 6,983,221, 2006 - Google Patents
A computer-assisted system, medium and method of providing a risk assessment of a target
system. The method includes providing one or more test requirements categories …
system. The method includes providing one or more test requirements categories …
Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
RP Tracy, H Barrett, GM Catlin - US Patent 6,980,927, 2005 - Google Patents
Viding a risk assessment of a target System. The method includes electronically Scanning,
on a predetermined basis, hardware and/or Software characteristics of components within a …
on a predetermined basis, hardware and/or Software characteristics of components within a …
COTS diversity based intrusion detection and application to web servers
It is commonly accepted that intrusion detection systems (IDS) are required to compensate
for the insufficient security mechanisms that are available on computer systems and …
for the insufficient security mechanisms that are available on computer systems and …
Automatic software diversity in the light of test suites
B Baudry, S Allier, M Rodriguez-Cancio… - arXiv preprint arXiv …, 2015 - arxiv.org
A few works address the challenge of automating software diversification, and they all share
one core idea: using automated test suites to drive diversification. However, there is is lack …
one core idea: using automated test suites to drive diversification. However, there is is lack …
Practical solution for location privacy in mobile IPv6
SG Choi, K Kim, BG Kim - International Workshop on Information Security …, 2003 - Springer
Mobile IP (MIP) enables the Mobile Node (MN) to move around without loosing their
transport-layer connectivity by using resources in the foreign domain network. MIP is …
transport-layer connectivity by using resources in the foreign domain network. MIP is …
[PDF][PDF] Experiments on cots diversity as an intrusion detection and tolerance mechanism
ABSTRACT COTS (Components-Off-The-Shelf) diversity has been proposed by many recent
projects to ensure intrusion detection and tolerance. However using COTS in a N-version …
projects to ensure intrusion detection and tolerance. However using COTS in a N-version …
Détection d'intrusions comportementale par diversification de COTS: application au cas des serveurs web
F Majorczyk - 2008 - theses.hal.science
L'informatique et en particulier l'Internet jouent un rôle grandissant dans notre société. Un
grand nombre d'applications critiques d'un point de vue de leur sécurité sont déployées …
grand nombre d'applications critiques d'un point de vue de leur sécurité sont déployées …
A dependable intrusion detection architecture based on agreement services
In this paper, we show that the use of diversified COTS servers allows to detect intrusions
corresponding to unknown attacks. We present an architecture that ensures both …
corresponding to unknown attacks. We present an architecture that ensures both …
Intrusion-tolerant system design for web server survivability
DS Choi, EG Im, CW Lee - … : 4th International Workshop, WISA 2003 Jeju …, 2004 - Springer
Internet becomes more and more popular, and most companies and institutes use web
services for e-business to promote their business. As results, Internet and web services …
services for e-business to promote their business. As results, Internet and web services …