{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:54Z","timestamp":1750219854072,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3603781.3603875","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T18:02:29Z","timestamp":1690480949000},"page":"536-540","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CryptMTD: Cryptography Based Moving Target Defense System for Mobile Application"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9050-9040","authenticated-orcid":false,"given":"Yuehua","family":"Lv","sequence":"first","affiliation":[{"name":"Zhejiang Institute of Science and Technology Information, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6094-4904","authenticated-orcid":false,"given":"Ting","family":"Tian","sequence":"additional","affiliation":[{"name":"Zhejiang Zhibei Information Technology Co., Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0040-3001","authenticated-orcid":false,"given":"Huanyao","family":"Hu","sequence":"additional","affiliation":[{"name":"Zhejiang Institute of Science and Technology Information, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3764-5766","authenticated-orcid":false,"given":"Wei","family":"Kui","sequence":"additional","affiliation":[{"name":"Zhejiang Institute of Science and Technology Information, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0200-4358","authenticated-orcid":false,"given":"Dongchuan","family":"Lu","sequence":"additional","affiliation":[{"name":"Zhejiang Institute of Science and Technology Information, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9348-5787","authenticated-orcid":false,"given":"Zhengda","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang Zhibei Information Technology Co., Ltd., China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2963791"},{"volume-title":"Kim D S 2016 Assessing the effectiveness of moving target defenses using security models IEEE Trans. Dependable Secure Comput. 13 163\u201377","author":"Hong J B","key":"e_1_3_2_1_2_1","unstructured":"Hong J B and Kim D S 2016 Assessing the effectiveness of moving target defenses using security models IEEE Trans. Dependable Secure Comput. 13 163\u201377 Hong J B and Kim D S 2016 Assessing the effectiveness of moving target defenses using security models IEEE Trans. Dependable Secure Comput. 13 163\u201377"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2969353"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Papadogiannakis A Loutsis L Papaefstathiou V and Ioannidis S 2013 ASIST: architectural support for instruction set randomization Proc. 2013 ACM SIGSAC conf. on Computer & communications security (New York: Association for Computing Machinery) pp 981-992. Papadogiannakis A Loutsis L Papaefstathiou V and Ioannidis S 2013 ASIST: architectural support for instruction set randomization Proc. 2013 ACM SIGSAC conf. on Computer & communications security (New York: Association for Computing Machinery) pp 981-992.","DOI":"10.1145\/2508859.2516670"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"S 2021 Randomization-based Defenses against Data-Oriented Attacks Proc. 8th ACM Workshop on Moving Target Defense (New York: Association for Computing Machinery)","author":"Volckaert","unstructured":"Volckaert S 2021 Randomization-based Defenses against Data-Oriented Attacks Proc. 8th ACM Workshop on Moving Target Defense (New York: Association for Computing Machinery) pp 1 - 2 . Volckaert S 2021 Randomization-based Defenses against Data-Oriented Attacks Proc. 8th ACM Workshop on Moving Target Defense (New York: Association for Computing Machinery) pp 1-2."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3190556"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Zhang Y Chang X Mi\u0161i\u0107 J Mi\u0161i\u0107 V B and Cai Y 2021 Cost-effective migration-based dynamic platform defense technique: a CTMDP approach Peer-to-Peer Networking and Applications 14 1207\u201317 Zhang Y Chang X Mi\u0161i\u0107 J Mi\u0161i\u0107 V B and Cai Y 2021 Cost-effective migration-based dynamic platform defense technique: a CTMDP approach Peer-to-Peer Networking and Applications 14 1207\u201317","DOI":"10.1007\/s12083-021-01084-8"},{"key":"e_1_3_2_1_8_1","first-page":"241","volume-title":"Conf. on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom) (IEEE)","author":"Azab M","unstructured":"Azab M , Hassan R and Eltoweissy M . 2011 ChameleonSoft:a moving target defense system 7th Int . Conf. on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom) (IEEE) pp 241 - 250 Azab M, Hassan R and Eltoweissy M. 2011 ChameleonSoft:a moving target defense system 7th Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom) (IEEE) pp 241-250"},{"key":"e_1_3_2_1_9_1","first-page":"264","volume-title":"2014 44th Annual IEEE\/IFIP Int. Conf. on Dependable Systems and Networks (IEEE)","author":"Jia Q","unstructured":"Jia Q , Wang H , Fleck D , Li F , Stavrou A and Power W . 2014 Catch me if you can: A cloud-enabled DDoS defense . 2014 44th Annual IEEE\/IFIP Int. Conf. on Dependable Systems and Networks (IEEE) pp 264 - 275 Jia Q, Wang H, Fleck D, Li F, Stavrou A and Power W. 2014 Catch me if you can: A cloud-enabled DDoS defense. 2014 44th Annual IEEE\/IFIP Int. Conf. on Dependable Systems and Networks (IEEE) pp 264-275"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Rajasekaran P Crane S Gens D Na Y Volckaert S and Franz M 2020 CoDaRR:Continuous data space randomization against data-only attacks. Proc. 15th ACM Asia Conf. on Computer and Communications Security (New York: Association for Computing Machinery) pp 494-505. Rajasekaran P Crane S Gens D Na Y Volckaert S and Franz M 2020 CoDaRR:Continuous data space randomization against data-only attacks. Proc. 15th ACM Asia Conf. on Computer and Communications Security (New York: Association for Computing Machinery) pp 494-505.","DOI":"10.1145\/3320269.3384757"}],"event":{"name":"CNIOT'23: 2023 4th International Conference on Computing, Networks and Internet of Things","acronym":"CNIOT'23","location":"Xiamen China"},"container-title":["Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603875","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603781.3603875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:10Z","timestamp":1750178830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":10,"alternative-id":["10.1145\/3603781.3603875","10.1145\/3603781"],"URL":"https:\/\/doi.org\/10.1145\/3603781.3603875","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}