期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
SecMVX:Analysis on the Vulnerability of Multi-Variant Execution
1
作者 Bingzheng Li Zheng Zhang +2 位作者 Xiaomei Wang Sheng Qu Jiangxing Wu 《China Communications》 SCIE CSCD 2021年第8期85-95,共11页
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution.Compared with patch-style passive defense,MVX can defend ag... As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution.Compared with patch-style passive defense,MVX can defend against known and even unknown vulnerability-based attacks without relying on attack feature information.However,variants generated with software diversity technologies will introduce new vulnerabilities when they execute in parallel.First,we analyze the security of MVX theory from the perspective of formal description.Then we summarize the general forms and techniques for attacks against MVX,and analyze the new vulnerabilities arising from the combination of variant generation technologies.We propose SecMVX,a secure MVX architecture and variant generation technology.Experimental evaluations based on CVEs and SPEC 2006 benchmark show that SecMVX introduces 11.29%of the average time overhead,and avoids vulnerabilities caused by the improper combination of variant generation technologies while keeping the defensive ability of MVX. 展开更多
关键词 multi-variant execution software diversity cyberspace security
下载PDF
Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud
2
作者 Junchao Wang Jianmin Pang Jin Wei 《国际计算机前沿大会会议论文集》 2021年第2期129-138,共10页
Users usually focus on the application-level requirements which are quite friendly and direct to them.However,there are no existing tools automating the application-level requirements to infrastructure provisioning an... Users usually focus on the application-level requirements which are quite friendly and direct to them.However,there are no existing tools automating the application-level requirements to infrastructure provisioning and application deployment.Although some security issues have been solved during the development phase,the undiscovered vulnerabilities remain hidden threats to the application’s security.Cyberspace mimic defense(CMD)technologies can help to enhance the application’s security despite the existence of the vulnerability.In this paper,the concept of SECurity-as-a-Service(SECaaS)is proposed with CMD technologies in cloud environments.The experiment on it was implemented.It is found that the application’s security is greatly improved to meet the user’s security and performance requirements within budgets through SECaaS.The experimental results show that SECaaS can help the users to focus on application-level requirements(monetary costs,required security level,etc.)and automate the process of application orchestration. 展开更多
关键词 Cyberspace mimic defense software diversity Security-as-a-Service Multi-compiler Application deployment
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部