It is our great pleasure to welcome you to the First ACM Workshop on Moving Target Defense -- MTD 2014.
The static nature of current computing systems has made them easy to attack and harder to defend. Adversaries have an asymmetric advantage in that they have the time to study a system, identify its vulnerabilities, and choose the time and place of attack to gain the maximum benefit. The idea of moving target defense is to impose the same asymmetric disadvantage on the attacker by making systems dynamic and harder to predict. With a constantly changing system and its ever adapting attack surface, the attacker will have to deal with a great deal of uncertainty just like defenders do today. The ultimate goal is to level the cybersecurity playing field for defenders versus attackers. This workshop was created to bring together researchers from academia, government, and industry to report on the latest research efforts on MTD and related topics, and to have productive discussion and constructive debate on this topic.
Proceeding Downloads
No free lunch in cyber security
Confidentiality, integrity and availability (CIA) are traditionally considered to be the three core goals of cyber security. By developing probabilistic models of these security goals we show that:
the CIA goals are actually specific operating points in ...
Security and Science of Agility
- Patrick McDaniel,
- Trent Jaeger,
- Thomas F. La Porta,
- Nicolas Papernot,
- Robert J. Walls,
- Alexander Kott,
- Lisa Marvel,
- Ananthram Swami,
- Prasant Mohapatra,
- Srikanth V. Krishnamurthy,
- Iulian Neamtiu
Moving target defenses alter the environment in response to adversarial action and perceived threats. Such defenses are a specific example of a broader class of system management techniques called system agility. In its fullest generality, agility is ...
A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses
Moving target defenses based on dynamic platforms have been proposed as a way to make systems more resistant to attacks by changing the properties of the deployed platforms. Unfortunately, little work has been done on discerning effective strategies for ...
Towards a Theory of Moving Target Defense
The static nature of cyber systems gives attackers the advantage of time. Fortunately, a new approach, called the Moving Target Defense (MTD) has emerged as a potential solution to this problem. While promising, there is currently little research to ...
On the Challenges of Effective Movement
Moving Target (MT) defenses have been proposed as a game-changing approach to rebalance the security landscape in favor of the defender. MT techniques make systems less deterministic, less static, and less homogeneous in order to increase the level of ...
Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed
In this paper, we investigate a model where a defender and an attacker simultaneously and repeatedly adjust the defenses and attacks. Under this model, we propose two iterative reinforcement learning algorithms which allow the defender to identify ...
Moving Target Defense for Hardening the Security of the Power System State Estimation
State estimation plays a critically important role in ensuring the secure and reliable operation of the electric grid. Recent works have shown that the state estimation process is vulnerable to stealthy attacks where an adversary can alter certain ...
Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers
The static one-to-one binding of hosts to IP addresses allows adversaries to conduct thorough reconnaissance in order to discover and enumerate network assets. Specifically, this fixed address mapping allows distributed network scanners to aggregate ...
Software Security and Randomization through Program Partitioning and Circuit Variation
The commodity status of Field Programmable Gate Arrays (FPGAs) has allowed computationally intensive algorithms, such as cryptographic protocols, to take advantage of faster hardware speed while simultaneously leveraging the reconfigurability and lower ...
Software Profiling Options and Their Effects on Security Based Diversification
Imparting diversity to binaries by inserting garbage instructions is an effective defense against code-reuse attacks. Relocating and breaking up code gadgets removes an attacker's ability to craft attacks by merely studying the existing code on their ...
Comparing Different Moving Target Defense Techniques
Moving Target Defense techniques have been proposed to increase uncertainty and apparent complexity for attackers. When more than one Moving Target Defense techniques are effective to limit opportunities of an attack, it is required to compare these ...
Index Terms
- Proceedings of the First ACM Workshop on Moving Target Defense