Tailored source code transformations to synthesize computationally diverse program variants, Proceedings of the 2014 International Symposium on Software Testing and Analysis, ISSTA 2014, 2014. ,
DOI : 10.1145/2610384.2610415
URL : https://hal.archives-ouvertes.fr/hal-00938855
Sqlrand: Preventing sql injection attacks, Proceedings of the Applied Cryptography and Network Security Conference, pp.292-302, 2004. ,
Operating system protection through program evolution, Computers & Security, vol.12, issue.6, pp.565-584, 1993. ,
Towards Model-Driven Provisioning, Deployment, Monitoring, and Adaptation of Multi-cloud Systems, 2013 IEEE Sixth International Conference on Cloud Computing, pp.887-894, 2013. ,
DOI : 10.1109/CLOUD.2013.133
Building diverse computer systems, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133), pp.67-72, 1997. ,
DOI : 10.1109/HOTOS.1997.595185
Moving Target [Guest editors' introduction], IEEE Security & Privacy, vol.12, issue.2, pp.14-15, 2014. ,
DOI : 10.1109/MSP.2014.29
Quality of service profiling, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, ICSE '10, pp.25-34, 2010. ,
DOI : 10.1145/1806799.1806808
Finding Focus in the Blur of Moving-Target Techniques, IEEE Security & Privacy, vol.12, issue.2, pp.16-26, 2014. ,
DOI : 10.1109/MSP.2013.137
Which is riskier: OS diversity or OS monopoly?, Communications of the ACM, vol.50, issue.8, p.112, 2007. ,
Risks of monoculture, Communications of the ACM, vol.47, issue.3, p.120, 2004. ,
DOI : 10.1145/971617.971650
Automatically finding patches using genetic programming, 2009 IEEE 31st International Conference on Software Engineering, pp.364-374, 2009. ,
DOI : 10.1109/ICSE.2009.5070536
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.8995
Address obfuscation: an efficient approach to combat a broad range of memory error exploits, Proceedings of the USENIX Security Symposium, 2003. ,
Chit Wei Nick Saw, and Ramarathnam Venkatesan. The superdiversifier: Peephole individualization for software protection, Advances in Information and Computer Security, pp.100-120, 2008. ,
Automated software diversity, Proceedings of IEEE Security & Privacy, 2014. ,
DOI : 10.2200/s00686ed1v01y201512spt014
Protection of software-based survivability mechanisms, Proceedings of the International Conference on Dependable Systems and Networks, pp.193-202, 2001. ,
Security through Diversity: Leveraging Virtual Machine Technology, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.26-33, 2009. ,
DOI : 10.1109/MSP.2009.18