{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:34Z","timestamp":1771699834396,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319113784","type":"print"},{"value":"9783319113791","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11379-1_20","type":"book-chapter","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T03:14:54Z","timestamp":1408504494000},"page":"405-425","source":"Crossref","is-referenced-by-count":25,"title":["Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism"],"prefix":"10.1007","author":[{"given":"Hamed","family":"Okhravi","sequence":"first","affiliation":[]},{"given":"James","family":"Riordan","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Carter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Networking, F., Research, I.T., (NITRD), D.: Federal Cybersecurity Game-change R&D Themes (2012), http:\/\/cybersecurity.nitrd.gov\/page\/federal-cybersecurity-1"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2009.18","volume":"7","author":"D. Williams","year":"2009","unstructured":"Williams, D., Hu, W., Davidson, J.W., Hiser, J.D., Knight, J.C., Nguyen-Tuong, A.: Security through diversity: Leveraging virtual machine technology. IEEE Security and Privacy\u00a07(1), 26\u201333 (2009)","journal-title":"IEEE Security and Privacy"},{"issue":"4","key":"20_CR3","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1109\/TDSC.2011.18","volume":"8","author":"B. Salamat","year":"2011","unstructured":"Salamat, B., Jackson, T., Wagner, G., Wimmer, C., Franz, M.: Runtime defense against code injection attacks using replicated execution. IEEE Transactions on Dependable and Secure Computing\u00a08(4), 588\u2013601 (2011)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Salamat, B., Gal, A., Jackson, T., Manivannan, K., Wagner, G., Franz, M.: Multi-variant program execution: Using multi-core systems to defuse buffer-overflow vulnerabilities. In: International Conference on Complex, Intelligent and Software Intensive Systems (2008)","DOI":"10.1109\/CISIS.2008.136"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Jackson, T., Salamat, B., Wagner, G., Wimmer, C., Franz, M.: On the effectiveness of multi-variant program execution for vulnerability detection and prevention. In: Proceedings of the 6th International Workshop on Security Measurements and Metrics, vol.\u00a07, pp. 7:1\u20137:8 (2010)","DOI":"10.1145\/1853919.1853929"},{"issue":"1","key":"20_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1055626.1055632","volume":"33","author":"D.A. Holland","year":"2005","unstructured":"Holland, D.A., Lim, A.T., Seltzer, M.I.: An architecture a day keeps the hacker away. SIGARCH Comput. Archit. News\u00a033(1), 34\u201341 (2005)","journal-title":"SIGARCH Comput. Archit. News"},{"issue":"1","key":"20_CR7","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.ijcip.2012.01.002","volume":"5","author":"H. Okhravi","year":"2012","unstructured":"Okhravi, H., Comella, A., Robinson, E., Haines, J.: Creating a cyber moving target for critical infrastructure applications using platform diversity. International Journal of Critical Infrastructure Protection\u00a05(1), 30\u201339 (2012)","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"1","key":"20_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TDSC.2008.1","volume":"6","author":"A. Saidane","year":"2009","unstructured":"Saidane, A., Nicomette, V., Deswarte, Y.: The design of a generic intrusion-tolerant architecture for web servers. IEEE Transactions on Dependable and Secure Computing\u00a06(1), 45\u201358 (2009)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Bangalore, A., Sood, A.: Securing web servers using self cleansing intrusion tolerance (scit). In: Second International Conference on Dependability, pp. 60 \u201365 (2009)","DOI":"10.1109\/DEPEND.2009.15"},{"key":"20_CR10","unstructured":"Huang, Y., Arsenault, D., Sood, A.: Incorruptible system self-cleansing for intrusion tolerance. In: 25th IEEE International on Performance, Computing, and Communications Conference, IPCCC 2006, vol.\u00a04, p. 496 (April 2006)"},{"key":"20_CR11","first-page":"343","volume-title":"Proceedings of the Second International Conference on Availability, Reliability and Security, ARES 2007","author":"D. Arsenault","year":"2007","unstructured":"Arsenault, D., Sood, A., Huang, Y.: Secure, resilient computing clusters: Self-cleansing intrusion tolerance with hardware enforced security (scit\/hes). In: Proceedings of the Second International Conference on Availability, Reliability and Security, ARES 2007, pp. 343\u2013350. IEEE Computer Society, Washington, DC (2007)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Okhravi, H., Hobson, T., Bigelow, D., Streilein, W.: Finding Focus in the Blur of Moving-Target Techniques. IEEE Security & Privacy (March\/April 2014)","DOI":"10.21236\/ADA591804"},{"key":"20_CR13","unstructured":"Scott, K., Davidson, J.: Strata: A Software Dynamic Translation Infrastructure. Technical Report CS-2001-17 (2001)"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1250734.1250746","volume-title":"Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007","author":"N. Nethercote","year":"2007","unstructured":"Nethercote, N., Seward, J.: Valgrind: A framework for heavyweight dynamic binary instrumentation. In: Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007, pp. 89\u2013100. ACM, New York (2007)"},{"key":"20_CR15","unstructured":"Salamat, B., Gal, A., Franz, M.: Reverse stack execution in a multi-variant execution environment. In: Workshop on Compiler and Architectural Techniques for Application Reliability and Security (2008)"},{"key":"20_CR16","unstructured":"Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems: A secretless framework for security through diversity. In: Proceedings of the 15th Conference on USENIX Security Symposium (2006)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Crouse, M., Fulp, E.: A moving target environment for computer configurations using genetic algorithms. In: 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), pp. 1\u20137 (October 2011)","DOI":"10.1109\/SafeConfig.2011.6111663"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Huang, Y., Ghosh, A.K.: Introducing diversity and uncertainty to create moving attack surfaces for web services. In: Moving Target Defense, pp. 131\u2013151 (2011)","DOI":"10.1007\/978-1-4614-0977-9_8"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Min, B.J., Choi, J.S.: An approach to intrusion tolerance for mission-critical services using adaptability and diverse replication. Future Gener. Comput. Syst, 303\u2013313 (2004)","DOI":"10.1016\/S0167-739X(03)00146-8"},{"key":"20_CR20","unstructured":"Kolyshkin, K.: Virtualization in linux. White paper, OpenVZ (September 2006)"},{"issue":"6","key":"20_CR21","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1002\/cpe.1541","volume":"22","author":"G. Rodr\u00edguez","year":"2010","unstructured":"Rodr\u00edguez, G., Mart\u00edn, M.J., Gonz\u00e1lez, P., Touri\u00f1o, J., Doallo, R.: Cppc: A compiler-assisted tool for portable checkpointing of message-passing applications. Concurr. Comput.: Pract. Exper.\u00a022(6), 749\u2013766 (2010)","journal-title":"Concurr. Comput. : Pract. Exper."},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Lippmann, R.P., Riordan, J.F., Yu, T.H., Watson, K.K.: Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics. Technical report. MIT Lincoln Laboratory (May 2012)","DOI":"10.21236\/ADA565825"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Bangalore, A.K., Sood, A.K.: Securing web servers using self cleansing intrusion tolerance (scit). In: Proceedings of the 2009 Second International Conference on Dependability, pp. 60\u201365 (2009)","DOI":"10.1109\/DEPEND.2009.15"},{"issue":"5","key":"20_CR24","first-page":"21","volume":"1","author":"Y. Huang","year":"2006","unstructured":"Huang, Y., Arsenault, D., Arun, S.: Incorruptible self-cleansing intrusion tolerance and its application to dns security. A Journal of Networks\u00a01(5), 21\u201330 (2006)","journal-title":"A Journal of Networks"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Huang, Y., Ghosh, A.: Automating intrusion response via virtualization for realizing uninterruptible web services. In: Eighth IEEE International Symposium on Network Computing and Applications, NCA 2009, pp. 114\u2013117 (July 2009)","DOI":"10.1109\/NCA.2009.37"},{"key":"20_CR26","unstructured":"Blackmon, S., Nguyen, J.: High-availability file server with heartbeat. System Admin. The Journal for UNIX and Linux Systems Administration 10(9) (2001)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Rabbat, R., McNeal, T., Burke, T.: A high-availability clustering architecture with data integrity guarantees. In: IEEE International Conference on Cluster Computing (2001)","DOI":"10.1109\/CLUSTR.2001.959974"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Petkac, M., Badger, L.: Security agility in response to intrusion detection. In: 16th Annual Computer Security Applications Conference (ACSAC), vol.\u00a011 (2000)","DOI":"10.1109\/ACSAC.2000.898853"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Jackson, T., Salamat, B., Homescu, A., Manivannan, K., Wagner, G., Gal, A., Brunthaler, S., Wimmer, C., Franz, M.: Compiler-generated software diversity. In: Moving Target Defense, pp. 77\u201398 (2011)","DOI":"10.1007\/978-1-4614-0977-9_4"},{"key":"20_CR30","first-page":"494","volume-title":"Proceedings of the 34th Annual International Symposium on Computer Architecture, ISCA 2007","author":"Z. Wang","year":"2007","unstructured":"Wang, Z., Lee, R.B.: New cache designs for thwarting software cache-based side channel attacks. In: Proceedings of the 34th Annual International Symposium on Computer Architecture, ISCA 2007, pp. 494\u2013505. ACM, New York (2007)"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Manadhata, P.K., Wing, J.M.: A formal model for a system\u2019s attack surface. In: Moving Target Defense, pp. 1\u201328 (2011)","DOI":"10.1007\/978-1-4614-0977-9_1"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Evans, D., Nguyen-Tuong, A., Knight, J.C.: Effectiveness of moving target defenses. In: Moving Target Defense, pp. 29\u201348 (2011)","DOI":"10.1007\/978-1-4614-0977-9_2"},{"key":"20_CR33","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-0-387-84814-3_22","volume-title":"Proceedings of the European Computing Conference","author":"G. Popov","year":"2009","unstructured":"Popov, G., Mladenov, V.: Modeling diversity in recovery computer systems. In: Mastorakis, N., Mladenov, V., Kontargyri, V.T. (eds.) Proceedings of the European Computing Conference. LNEE, vol.\u00a027, pp. 223\u2013233. Springer, US (2009)"},{"issue":"4","key":"20_CR34","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1109\/12.54843","volume":"39","author":"J. Arlat","year":"1990","unstructured":"Arlat, J., Kanoun, K., Laprie, J.C.: Dependability modeling and evaluation of software fault-tolerant systems. IEEE Trans. Comput.\u00a039(4), 504\u2013513 (1990)","journal-title":"IEEE Trans. Comput."}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11379-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T08:27:03Z","timestamp":1746347223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11379-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319113784","9783319113791"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11379-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}