Computer system with moving target defenses against vulnerability attacks
Abstract
A computer system includes an ensemble moving target defense architecture that protects the computer system against attack using one or more composable protection layers that change each churn cycle, thereby requiring an attacker to acquire information needed for an attack (e.g., code and pointers) and successfully deploy the attack, before the layers have changed state. Each layer may deploy a respective attack information asset protection providing multiple respective attack protections each churn cycle, wherein the respective attack information asset protections may differ.
- Inventors:
- Issue Date:
- Research Org.:
- Univ. of Michigan, Ann Arbor, MI (United States)
- Sponsoring Org.:
- USDOE; Defense Advanced Research Projects Agency (DARPA)
- OSTI Identifier:
- 2222288
- Patent Number(s):
- 11748490
- Application Number:
- 17/566,053
- Assignee:
- The Regents of the University of Michigan (Ann Arbor, MI)
- DOE Contract Number:
- HR0011-18-C-0019
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 12/30/2021
- Country of Publication:
- United States
- Language:
- English
Citation Formats
Austin, Todd, Bertacco, Valeria, Gallagher, Mark, and Kasikci, Baris. Computer system with moving target defenses against vulnerability attacks. United States: N. p., 2023.
Web.
Austin, Todd, Bertacco, Valeria, Gallagher, Mark, & Kasikci, Baris. Computer system with moving target defenses against vulnerability attacks. United States.
Austin, Todd, Bertacco, Valeria, Gallagher, Mark, and Kasikci, Baris. Tue .
"Computer system with moving target defenses against vulnerability attacks". United States. https://www.osti.gov/servlets/purl/2222288.
@article{osti_2222288,
title = {Computer system with moving target defenses against vulnerability attacks},
author = {Austin, Todd and Bertacco, Valeria and Gallagher, Mark and Kasikci, Baris},
abstractNote = {A computer system includes an ensemble moving target defense architecture that protects the computer system against attack using one or more composable protection layers that change each churn cycle, thereby requiring an attacker to acquire information needed for an attack (e.g., code and pointers) and successfully deploy the attack, before the layers have changed state. Each layer may deploy a respective attack information asset protection providing multiple respective attack protections each churn cycle, wherein the respective attack information asset protections may differ.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2023},
month = {9}
}
Works referenced in this record:
Real-time evaluation of impact- and state-of-compromise due to vulnerabilities described in enterprise threat detection security notes
patent, October 2018
- Seifert, Hartwig; Zhang, Nan; Mehta, Harish
- US Patent Document 10,102,379
System and methods for sandboxed malware analysis and automated patch development, deployment and validation
patent, September 2020
- Crabtree, Jason; Sellers, Andrew
- US Patent Document 10,783,241
Systems and Methods for Patching Vulnerabilities
patent-application, December 2019
- Petratos, Spiros; Hogge, Rick; Nuthulapati, Praveen
- US Patent Application 15/993338; 20190370471
Enterprise level cybersecurity automatic remediation
patent, April 2019
- DiGiambattista, Ernesto; Bezdedeanu, Andrei; Kail, Michael D.
- US Patent Document 10,277,622
Timely address space randomization
patent, June 2019
- Okhravi, Hamed; Hobson, Thomas R.; Bigelow, David O.
- US Patent Document 10,310,991
Methods, systems, and media for inhibiting attacks on embedded devices
patent, July 2016
- Cui, Ang; Stolfo, Salvatore J.
- US Patent Document 9,392,017
Methods, systems, and media for injecting code into embedded devices
patent, August 2018
- Cui, Ang; Stolfo, Salvatore J.
- US Patent Document 10,055,251
Systems and methods for controlling access to credentials
patent, September 2020
- Li, Feng; Glick, Adam; Schlatter, Brian
- US Patent Document 10,769,267
Software Protection through Code and Control Flow Data Hiding and Obfuscation
patent-application, May 2019
- Wallace, Brooke; Mumme, Dean C.; McGraw, Robert
- US Patent Application 16/020726; 20190156025
Threat mitigation system and method
patent, August 2021
- Murphy, Brian Philip; Partlow, Joe; O'Connor, Colin
- US Patent Document 11,108,798
Method for Runtime Mitigation of Software and Firmware Code Weaknesses
patent-application, October 2013
- Ofek, David Mor; Weisglass, Yuval
- US Patent Application 16/368113; 20190303585
Systems and methods for patching vulnerabilities
patent, March 2020
- Petratos, Spiros; Hogge, Rick; Nuthulapati, Praveen
- US Patent Document 10,592,677
Dynamic honeypots for computer program execution environments
patent, February 2022
- Lieberman, Amit; Natanzon, Assaf; Golan, Oron
- US Patent Document 11,240,268