skip to main content
10.1145/2663474acmconferencesBook PagePublication PagesicseConference Proceedingsconference-collections
MTD '14: Proceedings of the First ACM Workshop on Moving Target Defense
ACM2014 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security Scottsdale Arizona USA 7 November 2014
ISBN:
978-1-4503-3150-0
Published:
07 November 2014
Sponsors:
Next Conference
Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the First ACM Workshop on Moving Target Defense -- MTD 2014.

The static nature of current computing systems has made them easy to attack and harder to defend. Adversaries have an asymmetric advantage in that they have the time to study a system, identify its vulnerabilities, and choose the time and place of attack to gain the maximum benefit. The idea of moving target defense is to impose the same asymmetric disadvantage on the attacker by making systems dynamic and harder to predict. With a constantly changing system and its ever adapting attack surface, the attacker will have to deal with a great deal of uncertainty just like defenders do today. The ultimate goal is to level the cybersecurity playing field for defenders versus attackers. This workshop was created to bring together researchers from academia, government, and industry to report on the latest research efforts on MTD and related topics, and to have productive discussion and constructive debate on this topic.

Skip Table Of Content Section
SESSION: Keynote Address
keynote
No free lunch in cyber security

Confidentiality, integrity and availability (CIA) are traditionally considered to be the three core goals of cyber security. By developing probabilistic models of these security goals we show that:

  • the CIA goals are actually specific operating points in ...

keynote
Security and Science of Agility

Moving target defenses alter the environment in response to adversarial action and perceived threats. Such defenses are a specific example of a broader class of system management techniques called system agility. In its fullest generality, agility is ...

SESSION: Technical Session I
research-article
A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses

Moving target defenses based on dynamic platforms have been proposed as a way to make systems more resistant to attacks by changing the properties of the deployed platforms. Unfortunately, little work has been done on discerning effective strategies for ...

research-article
Towards a Theory of Moving Target Defense

The static nature of cyber systems gives attackers the advantage of time. Fortunately, a new approach, called the Moving Target Defense (MTD) has emerged as a potential solution to this problem. While promising, there is currently little research to ...

research-article
On the Challenges of Effective Movement

Moving Target (MT) defenses have been proposed as a game-changing approach to rebalance the security landscape in favor of the defender. MT techniques make systems less deterministic, less static, and less homogeneous in order to increase the level of ...

SESSION: Technical Session II
research-article
Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed

In this paper, we investigate a model where a defender and an attacker simultaneously and repeatedly adjust the defenses and attacks. Under this model, we propose two iterative reinforcement learning algorithms which allow the defender to identify ...

research-article
Moving Target Defense for Hardening the Security of the Power System State Estimation

State estimation plays a critically important role in ensuring the secure and reliable operation of the electric grid. Recent works have shown that the state estimation process is vulnerable to stealthy attacks where an adversary can alter certain ...

research-article
Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers

The static one-to-one binding of hosts to IP addresses allows adversaries to conduct thorough reconnaissance in order to discover and enumerate network assets. Specifically, this fixed address mapping allows distributed network scanners to aggregate ...

SESSION: Technical Session III
research-article
Software Security and Randomization through Program Partitioning and Circuit Variation

The commodity status of Field Programmable Gate Arrays (FPGAs) has allowed computationally intensive algorithms, such as cryptographic protocols, to take advantage of faster hardware speed while simultaneously leveraging the reconfigurability and lower ...

research-article
Software Profiling Options and Their Effects on Security Based Diversification

Imparting diversity to binaries by inserting garbage instructions is an effective defense against code-reuse attacks. Relocating and breaking up code gadgets removes an attacker's ability to craft attacks by merely studying the existing code on their ...

research-article
Comparing Different Moving Target Defense Techniques

Moving Target Defense techniques have been proposed to increase uncertainty and apparent complexity for attackers. When more than one Moving Target Defense techniques are effective to limit opportunities of an attack, it is required to compare these ...

Contributors
  • George Mason University
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

MTD '14 Paper Acceptance Rate9of16submissions,56%Overall Acceptance Rate40of92submissions,43%
YearSubmittedAcceptedRate
MTD '1855100%
MTD '1726935%
MTD '1626935%
MTD '1519842%
MTD '1416956%
Overall924043%