[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …
protecting computers from harmful malware. The goal of these techniques is not removing …
The multiple facets of software diversity: Recent developments in year 2000 and beyond
B Baudry, M Monperrus - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Early experiments with software diversity in the mid 1970s investigated N-version
programming and recovery blocks to increase the reliability of embedded systems. Four …
programming and recovery blocks to increase the reliability of embedded systems. Four …
[HTML][HTML] A model-based mode-switching framework based on security vulnerability scores
Software vulnerabilities can affect critical systems within an organization impacting
processes, workflows, privacy, and safety. When a software vulnerability becomes known …
processes, workflows, privacy, and safety. When a software vulnerability becomes known …
Enact: Development, operation, and quality assurance of trustworthy smart iot systems
To unleash the full potential of IoT and flourishing innovations in application domains such
as eHealth or smart city, it is critical to facilitate the creation and operation of trustworthy …
as eHealth or smart city, it is critical to facilitate the creation and operation of trustworthy …
A journey among Java neutral program variants
N Harrand, S Allier, M Rodriguez-Cancio… - … and Evolvable Machines, 2019 - Springer
Neutral program variants are alternative implementations of a program, yet equivalent with
respect to the test suite. Techniques such as approximate computing or genetic …
respect to the test suite. Techniques such as approximate computing or genetic …
Crow: Code diversification for webassembly
The adoption of WebAssembly has rapidly increased in the last few years as it provides a
fast and safe model for program execution. However, WebAssembly is not exempt from …
fast and safe model for program execution. However, WebAssembly is not exempt from …
Automated design of multi-layered web information systems
In the development of web information systems, design tasks are commonly used in
approaches for Model-Driven Web Engineering (MDWE) to represent models. To generate …
approaches for Model-Driven Web Engineering (MDWE) to represent models. To generate …
Internal interface diversification as a method against malware
Internal interface diversification is a proactive software security method that prevents
malware from using the fundamental services provided by an operating system by uniquely …
malware from using the fundamental services provided by an operating system by uniquely …
Successfully governing software ecosystems: Competence profiles of partnership managers
Successfully Governing Software Ecosystems: Competence Profiles of Partnership Managers
Page 1 FOCUS: MANAGING SOFTWARE PLATFORMS AND ECOSYSTEMS …
Page 1 FOCUS: MANAGING SOFTWARE PLATFORMS AND ECOSYSTEMS …
Multi-variant Execution at the Edge
Edge-Cloud computing offloads parts of the computations that traditionally occurs in the
cloud to edge nodes. The binary format WebAssembly is increasingly used to distribute and …
cloud to edge nodes. The binary format WebAssembly is increasingly used to distribute and …