[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

The multiple facets of software diversity: Recent developments in year 2000 and beyond

B Baudry, M Monperrus - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Early experiments with software diversity in the mid 1970s investigated N-version
programming and recovery blocks to increase the reliability of embedded systems. Four …

[HTML][HTML] A model-based mode-switching framework based on security vulnerability scores

M Riegler, J Sametinger, M Vierhauser… - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities can affect critical systems within an organization impacting
processes, workflows, privacy, and safety. When a software vulnerability becomes known …

Enact: Development, operation, and quality assurance of trustworthy smart iot systems

N Ferry, A Solberg, H Song, S Lavirotte, JY Tigli… - … Engineering Aspects of …, 2019 - Springer
To unleash the full potential of IoT and flourishing innovations in application domains such
as eHealth or smart city, it is critical to facilitate the creation and operation of trustworthy …

A journey among Java neutral program variants

N Harrand, S Allier, M Rodriguez-Cancio… - … and Evolvable Machines, 2019 - Springer
Neutral program variants are alternative implementations of a program, yet equivalent with
respect to the test suite. Techniques such as approximate computing or genetic …

Crow: Code diversification for webassembly

JC Arteaga, O Malivitsis, OV Perez, B Baudry… - arXiv preprint arXiv …, 2020 - arxiv.org
The adoption of WebAssembly has rapidly increased in the last few years as it provides a
fast and safe model for program execution. However, WebAssembly is not exempt from …

Automated design of multi-layered web information systems

FP Basso, RM Pillat, TC Oliveira, F Roos-Frantz… - Journal of systems and …, 2016 - Elsevier
In the development of web information systems, design tasks are commonly used in
approaches for Model-Driven Web Engineering (MDWE) to represent models. To generate …

Internal interface diversification as a method against malware

S Rauti, S Laurén, P Mäki, J Uitto, S Laato… - Journal of Cyber …, 2021 - Taylor & Francis
Internal interface diversification is a proactive software security method that prevents
malware from using the fundamental services provided by an operating system by uniquely …

Successfully governing software ecosystems: Competence profiles of partnership managers

T Kude, T Huber, J Dibbern - IEEE software, 2018 - ieeexplore.ieee.org
Successfully Governing Software Ecosystems: Competence Profiles of Partnership Managers
Page 1 FOCUS: MANAGING SOFTWARE PLATFORMS AND ECOSYSTEMS …

Multi-variant Execution at the Edge

J Cabrera Arteaga, P Laperdrix, M Monperrus… - Proceedings of the 9th …, 2022 - dl.acm.org
Edge-Cloud computing offloads parts of the computations that traditionally occurs in the
cloud to edge nodes. The binary format WebAssembly is increasingly used to distribute and …