{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:40:20Z","timestamp":1730317220461,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61273309"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-12-1-0286"],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["FP7-PEOPLE-2011-IIF-302421"],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004602","name":"Program for New Century Excellent Talents in University","doi-asserted-by":"publisher","award":["NCET-13-0139"],"id":[{"id":"10.13039\/501100004602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-09-1-0165"],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,8]]},"DOI":"10.1145\/2600176.2600180","type":"proceedings-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T13:53:50Z","timestamp":1407851630000},"page":"1-12","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Characterizing the power of moving target defense via cyber epidemic dynamics"],"prefix":"10.1145","author":[{"given":"Yujuan","family":"Han","sequence":"first","affiliation":[{"name":"Fudan University and University of Texas at San Antonio"}]},{"given":"Wenlian","family":"Lu","sequence":"additional","affiliation":[{"name":"Fudan University and University of Warwick"}]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio"}]}],"member":"320","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103633"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/850985.855567"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053286"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security Symposium","author":"Bhatkar S.","year":"2003","unstructured":"S. Bhatkar , D. DuVarney , and R. Sekar . Address obfuscation: An efficient approach to combat a board range of memory error exploits . In USENIX Security Symposium , 2003 . S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a board range of memory error exploits. In USENIX Security Symposium, 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.58"},{"key":"e_1_3_2_1_8_1","first-page":"265","volume-title":"Proc. CGO'03","author":"Bruening D.","unstructured":"D. Bruening , T. Garnett , and S. Amarasinghe . An infrastructure for adaptive dynamic optimization . In Proc. CGO'03 , pages 265 -- 275 . D. Bruening, T. Garnett, and S. Amarasinghe. An infrastructure for adaptive dynamic optimization. In Proc. CGO'03, pages 265--275."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02882-3_2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284681"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_1_12_1","first-page":"307","volume-title":"CRYPTO'89","author":"Desmedt Y.","unstructured":"Y. Desmedt and Y. Frankel . Threshold cryptosystems . In CRYPTO'89 , pages 307 -- 315 . Y. Desmedt and Y. Frankel. Threshold cryptosystems. In CRYPTO'89, pages 307--315."},{"key":"e_1_3_2_1_13_1","volume-title":"Springer","author":"Dynkin E. B.","year":"1965","unstructured":"E. B. Dynkin . Markov processes . Springer , Berlin , 1965 . E. B. Dynkin. Markov processes. Springer, Berlin, 1965."},{"volume-title":"Proc. HotOS-VI.","author":"Forrest S.","key":"e_1_3_2_1_14_1","unstructured":"S. Forrest , A. Somayaji , and D. Ackley . Building diverse computer systems . In Proc. HotOS-VI. S. Forrest, A. Somayaji, and D. Ackley. Building diverse computer systems. In Proc. HotOS-VI."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498374"},{"volume-title":"Proc. USENIX Security'12","author":"Giuffrida C.","key":"e_1_3_2_1_16_1","unstructured":"C. Giuffrida , A. Kuijsten , and A. Tanenbaum . Enhanced operating system security through efficient and fine-grained address space randomization . In Proc. USENIX Security'12 . C. Giuffrida, A. Kuijsten, and A. Tanenbaum. Enhanced operating system security through efficient and fine-grained address space randomization. In Proc. USENIX Security'12."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266442"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516675"},{"key":"e_1_3_2_1_20_1","first-page":"77","volume-title":"Diversifying the Software Stack Using Randomized NOP Insertion In S","author":"Jackson T.","unstructured":"T. Jackson , B. Salamat , A. Homescu , K. Manivannan , G. Wagner , A. Gal , S. Brunthaler , C. Wimmer , and M. Franz . Diversifying the Software Stack Using Randomized NOP Insertion In S . Jajodia, A. Ghosh, V. Swarup, C. Wang, and X. Wang, editors, Moving Target Defense , pages 77 -- 98 . T. Jackson, B. Salamat, A. Homescu, K. Manivannan, G. Wagner, A. Gal, S. Brunthaler, C. Wimmer, and M. Franz. Diversifying the Software Stack Using Randomized NOP Insertion In S. Jajodia, A. Ghosh, V. Swarup, C. Wang, and X. Wang, editors, Moving Target Defense, pages 77--98."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390250"},{"volume-title":"IEEE Symposium on Security and Privacy'91","author":"Kephart J.","key":"e_1_3_2_1_24_1","unstructured":"J. Kephart and S. White . Directed-graph epidemiological models of computer viruses . In IEEE Symposium on Security and Privacy'91 . J. Kephart and S. White. Directed-graph epidemiological models of computer viruses. In IEEE Symposium on Security and Privacy'91."},{"volume-title":"IEEE Symposium on Security and Privacy'93","author":"Kephart J.","key":"e_1_3_2_1_25_1","unstructured":"J. Kephart and S. White . Measuring and modeling computer virus prevalence . In IEEE Symposium on Security and Privacy'93 . J. Kephart and S. White. Measuring and modeling computer virus prevalence. In IEEE Symposium on Security and Privacy'93."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1927.0118"},{"volume-title":"Proc. DISCEX'01","author":"Kewley D.","key":"e_1_3_2_1_27_1","unstructured":"D. Kewley , R. Fink , J. Lowry , and M. Dean . Dynamic approaches to thwart adversary intelligence gathering . In Proc. DISCEX'01 . D. Kewley, R. Fink, J. Lowry, and M. Dean. Dynamic approaches to thwart adversary intelligence gathering. In Proc. DISCEX'01."},{"volume-title":"Proc. USENIX Security'02","author":"Kiriansky V.","key":"e_1_3_2_1_28_1","unstructured":"V. Kiriansky , D. Bruening , and S. Amarasinghe . Secure execution via program shepherding . In Proc. USENIX Security'02 . V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure execution via program shepherding. In Proc. USENIX Security'02."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0017-8"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_1"},{"key":"e_1_3_2_1_32_1","volume-title":"Jump linear systems in automatic control. Marcel dekker","author":"Mariton M.","year":"1990","unstructured":"M. Mariton . Jump linear systems in automatic control. Marcel dekker , New York , 1990 . M. Mariton. Jump linear systems in automatic control. Marcel dekker, New York, 1990."},{"key":"e_1_3_2_1_33_1","first-page":"98","article-title":"Applications of mathematics to medical problems","volume":"14","author":"McKendrick A.","year":"1926","unstructured":"A. McKendrick . Applications of mathematics to medical problems . Proc. of Edin. Math. Soceity , 14 : 98 -- 130 , 1926 . A. McKendrick. Applications of mathematics to medical problems. Proc. of Edin. Math. Soceity, 14:98--130, 1926.","journal-title":"Proc. of Edin. Math. Soceity"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516670"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.035108"},{"key":"e_1_3_2_1_38_1","first-page":"99","volume-title":"ECML\/PKDD (3)","author":"Prakash B.","year":"2010","unstructured":"B. Prakash , H. Tong , N. Valler , M. Faloutsos , and C. Faloutsos . Virus propagation on time-varying networks: Theory and immunization algorithms . In ECML\/PKDD (3) , pages 99 -- 114 , 2010 . B. Prakash, H. Tong, N. Valler, M. Faloutsos, and C. Faloutsos. Virus propagation on time-varying networks: Theory and immunization algorithms. In ECML\/PKDD (3), pages 99--114, 2010."},{"key":"e_1_3_2_1_39_1","volume-title":"Stability criteria for sis epidemiological models under switching policies","author":"Rami M.","year":"2013","unstructured":"M. Rami , V. Bokharaie , O. Mason , and F. Wirth . Stability criteria for sis epidemiological models under switching policies , 2013 . M. Rami, V. Bokharaie, O. Mason, and F. Wirth. Stability criteria for sis epidemiological models under switching policies, 2013."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_41_1","unstructured":"A. Sovarel D. Evans and N. Paul. Where's the feeb? the effectiveness of instruction set randomization. In Pro. USENIX Security'05. A. Sovarel D. Evans and N. Paul. Where's the feeb? the effectiveness of instruction set randomization. In Pro. USENIX Security'05 ."},{"key":"e_1_3_2_1_42_1","unstructured":"The PaX Team. http:\/\/pax.grsecurity.net\/docs\/aslr.txt. The PaX Team. http:\/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_43_1","volume-title":"Ordinary Differential Equations and Dynamical Systems","author":"Teschl G.","year":"2010","unstructured":"G. Teschl . Ordinary Differential Equations and Dynamical Systems . American Mathematical Society , 2010 . G. Teschl. Ordinary Differential Equations and Dynamical Systems. American Mathematical Society, 2010."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925623"},{"key":"e_1_3_2_1_45_1","first-page":"25","volume-title":"IEEE SRDS'03","author":"Wang Y.","unstructured":"Y. Wang , D. Chakrabarti , C. Wang , and C. Faloutsos . Epidemic spreading in real networks: An eigenvalue viewpoint . In IEEE SRDS'03 , pages 25 -- 34 . Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos. Epidemic spreading in real networks: An eigenvalue viewpoint. In IEEE SRDS'03, pages 25--34."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.33"},{"key":"e_1_3_2_1_48_1","volume-title":"Virtualwires for live migrating virtual networks across clouds (IBM TR rc25378","author":"William D.","year":"2013","unstructured":"D. William , Z. Jiang , H. Jamjoom , and H. Weatherspoon . Virtualwires for live migrating virtual networks across clouds (IBM TR rc25378 , 2013 ). D. William, Z. Jiang, H. Jamjoom, and H. Weatherspoon. Virtualwires for live migrating virtual networks across clouds (IBM TR rc25378, 2013)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600176.2600190"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555613"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348832.2348835"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.33"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_6"},{"key":"e_1_3_2_1_54_1","first-page":"246","volume-title":"Porc. GameSec'13","author":"Zhu Q.","unstructured":"Q. Zhu and T. Basar . Game-theoretic approach to feedback-driven multi-stage moving target defense . In Porc. GameSec'13 , pages 246 -- 263 . Q. Zhu and T. Basar. Game-theoretic approach to feedback-driven multi-stage moving target defense. In Porc. GameSec'13, pages 246--263."}],"event":{"name":"HotSoS '14: Symposium and Bootcamp on the Science of Security","sponsor":["No. Carolina State Univeresity North Carolina State University"],"location":"Raleigh North Carolina USA","acronym":"HotSoS '14"},"container-title":["Proceedings of the 2014 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600176.2600180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T18:32:43Z","timestamp":1673548363000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600180"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":54,"alternative-id":["10.1145\/2600176.2600180","10.1145\/2600176"],"URL":"https:\/\/doi.org\/10.1145\/2600176.2600180","relation":{},"subject":[],"published":{"date-parts":[[2014,4,8]]},"assertion":[{"value":"2014-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}