default search action
2nd MTD@CCS 2015: Denver, Colorado, USA
- George Cybenko, Dijiang Huang:
Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3823-3
MTD Keynote I
- Michael Franz:
From Fine Grained Code Diversity to JIT-ROP to Execute-Only Memory: The Cat and Mouse Game Between Attackers and Defenders Continues. 1
MTD Modeling and Evaluation I (regular papers)
- Kara Zaffarano, Joshua Taylor, Samuel N. Hamilton:
A Quantitative Framework for Moving Target Defense Effectiveness Evaluation. 3-10 - Rui Zhuang, Alexandru G. Bardas, Scott A. DeLoach, Xinming Ou:
A Theory of Cyber Attacks: A Step Towards Analyzing MTD Systems. 11-20 - Michael B. Crouse, Bryan Prosser, Errin W. Fulp:
Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses. 21-29
MTD Technologies I (short papers)
- Marc Green, Douglas C. MacFarland, Doran R. Smestad, Craig A. Shue:
Characterizing Network-Based Moving Target Defenses. 31-35 - Douglas C. MacFarland, Craig A. Shue:
The SDN Shuffle: Creating a Moving-Target Defense using Host-based Software-Defined Networking. 37-41 - Thomas C. Eskridge
, Marco M. Carvalho
, Evan Stoner
, Troy Toggweiler, Adrian Granados:
VINE: A Cyber Emulation Environment for MTD Experimentation. 43-47 - Abhinav Jangda, Mohit Mishra, Bjorn De Sutter:
Adaptive Just-In-Time Code Diversification. 49-53
MTD Keynote II
- Hamed Okhravi:
Getting Beyond Tit for Tat: Better Strategies for Moving Target Prototyping and Evaluation. 55
MTD Modeling and Evaluation II
- Achintya Prakash, Michael P. Wellman
:
Empirical Game-Theoretic Analysis for Moving Target Defense. 57-65 - Erik Miehling, Mohammad Rasouli, Demosthenis Teneketzis:
Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs. 67-76
Doctoral Symposium
- Christopher Morrell, Reese Moore, Randy C. Marchany, Joseph G. Tront:
DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses. 77-84 - Zhuo Lu, Lisa M. Marvel, Cliff Wang:
To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs. 85-93 - Alessandro Cabutto
, Paolo Falcarin
, Bert Abrath, Bart Coppens, Bjorn De Sutter:
Software Protection with Code Mobility. 95-103
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.