Abstract is missing.
- A Formal Model for a System's Attack SurfacePratyusa K. Manadhata, Jeannette M. Wing. 1-28 [doi]
- Effectiveness of Moving Target DefensesDavid Evans, Anh Nguyen-Tuong, John C. Knight. 29-48 [doi]
- Global ISR: Toward a Comprehensive Defense Against Unauthorized Code ExecutionGeorgios Portokalidis, Angelos D. Keromytis. 49-76 [doi]
- Compiler-Generated Software DiversityTodd Jackson, Babak Salamat, Andrei Homescu, Karthikeyan Manivannan, Gregor Wagner, Andreas Gal, Stefan Brunthaler, Christian Wimmer, Michael Franz. 77-98 [doi]
- Symbiotes and defensive Mutualism: Moving Target DefenseAng Cui, Salvatore J. Stolfo. 99-108 [doi]
- Manipulating Program Functionality to Eliminate Security VulnerabilitiesMartin C. Rinard. 109-115 [doi]
- End-to-End Software Diversification of Internet ServicesMihai Christodorescu, Matthew Fredrikson, Somesh Jha, Jonathon T. Giffin. 117-130 [doi]
- Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web ServicesYih Huang, Anup K. Ghosh. 131-151 [doi]
- Toward Network Configuration Randomization for Moving Target DefenseEhab Al-Shaer. 153-159 [doi]
- Configuration Management Security in Data Center EnvironmentsKrishna Kant. 161-181 [doi]