{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T01:13:19Z","timestamp":1673917999002},"reference-count":27,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. & Syst."],"published-print":{"date-parts":[[2019,10,1]]},"DOI":"10.1587\/transinf.2018edp7414","type":"journal-article","created":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T22:44:06Z","timestamp":1569883446000},"page":"1993-2003","source":"Crossref","is-referenced-by-count":3,"title":["A Diversity Metric Based Study on the Correlation between Diversity and Security"],"prefix":"10.1587","volume":"E102.D","author":[{"given":"Qing","family":"TONG","sequence":"first","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research and Development Center"}]},{"given":"Yunfei","family":"GUO","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research and Development Center"}]},{"given":"Hongchao","family":"HU","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research and Development Center"}]},{"given":"Wenyan","family":"LIU","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research and Development Center"}]},{"given":"Guozhen","family":"CHENG","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research and Development Center"}]},{"given":"Ling-shu","family":"LI","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research and Development Center"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] L. Ablon and A. Bogart, Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits, Rand Corporation, 2017.","DOI":"10.7249\/RR1751"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] B. Baudry and M. Monperrus, \u201cThe multiple facets of software diversity: Recent developments in year 2000 and beyond,\u201d ACM Computing Surveys, vol.48, no.1, pp.1-26, 2015. 10.1145\/2807593","DOI":"10.1145\/2807593"},{"key":"3","unstructured":"[3] A. Avizienis and M.R. Lyu, \u201cAssuring Design Diversity in N-Version Software: A Design Paradigm for N-Version Programming,\u201d Dependable Computing and Fault-Tolerant Systems, vol.6, pp.197-218, 1999. 10.1007\/978-3-7091-9198-9_10"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] D.H. Aristizaba, D.M. Rodriguez, and R.Y. Guevara, \u201cMeasuring ASLR implementations on modern operating systems,\u201d 47th International Carnahan Conf. on Security Technology (ICCST), Medellin, Colombia, Oct. 2013.","DOI":"10.1109\/CCST.2013.6922073"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] P. Larsen, A. Homescu, S. Brunthaler, and M. Franz, \u201cSoK: Automated Software Diversity,\u201d 2014 IEEE Symposium on Security and Privacy, San Jose, CA, USA, pp.276-291, May 2014. 10.1109\/sp.2014.25","DOI":"10.1109\/SP.2014.25"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] S. Heo, S. Lee, B. Jang, and H. Yoon, \u201cDesigning and implementing a diversity policy for intrusion-tolerant systems,\u201d IEICE Trans. Inf. & Syst., vol.E100-D, no.1, pp.118-129, 2017. 10.1587\/transinf.2015edp7478","DOI":"10.1587\/transinf.2015EDP7478"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] R. Zhuang, S.A. DeLoach, and X. Ou, \u201cTowards a theory of moving target defense,\u201d Proc. 1st ACM Workshop on Moving Target Defense, Scottsdale, Arizona, USA, pp.31-40, Nov. 2014. 10.1145\/2663474.2663479","DOI":"10.1145\/2663474.2663479"},{"key":"8","unstructured":"[8] B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A.N. Tuong, and J. Hiser, \u201cN-variant systems: A secretless framework for security through diversity,\u201d Conf. on Usenix Security Symposium, pp.105-120, 2006."},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] M. Castro and B. Liskov, \u201cPractical byzantine fault tolerance and proactive recovery,\u201d ACM Trans. on Computer Systems, vol.20, no.4, pp.398-461, 2002. 10.1145\/571637.571640","DOI":"10.1145\/571637.571640"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] T. Okamoto, \u201cDesign of a lightweight intrusion-tolerant system for highly available servers,\u201d Procedia Computer Science, vol.112, pp.2319-2327, 2017. 10.1016\/j.procs.2017.08.261","DOI":"10.1016\/j.procs.2017.08.261"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] H. Okhravi, T. Hobson, D. Bigelow, and W. Streilein, \u201cFinding focus in the blur of moving-target techniques,\u201d IEEE Security Privacy, vol.12, no.2, pp.16-26, 2014. 10.1109\/msp.2013.137","DOI":"10.1109\/MSP.2013.137"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] M. Gabel and Z. Su, \u201cA study of the uniqueness of source code,\u201d Proc. 18th ACM SIGSOFT international symposium on foundations of software engineering, pp.147-156, Nov. 2010. 10.1145\/1882291.1882315","DOI":"10.1145\/1882291.1882315"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] P. Laperdrix, W. Rudametkin, and B. Baudry, \u201cMitigating browser fingerprint tracking: multi-level reconfiguration and diversification,\u201d Proc. 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp.98-108, 2015. 10.1109\/seams.2015.18","DOI":"10.1109\/SEAMS.2015.18"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] J. Sagisi, J. Tront, and R. Marchany, \u201cSystem architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet,\u201d 2107 IEEE. MILCOM, pp.551-556, Oct. 2017. 10.1109\/milcom.2017.8170846","DOI":"10.1109\/MILCOM.2017.8170846"},{"key":"15","unstructured":"[15] E.E. Dave and D.L. Larry, \u201cA theoretical basis for the analysis of multiversion software subject to coincident errors,\u201d IEEE Trans. Softw. Eng., vol.11, no.12, pp.1511-1517, 1985."},{"key":"16","unstructured":"[16] S. Mitra, N.R. Saxena, and E.J. McCluskey, \u201cA design diversity metric and reliability analysis for redundant systems,\u201d IEEE International Test Conf. 1999 Proc., Atlantic City, NJ, USA, pp.662-671, Sept. 1999. 10.1109\/test.1999.805794"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] D. Partridge and W. Krzanowski, \u201cSoftware diversity: practical statistics for its measurement and exploitation,\u201d Information and software technology, vol.39, no.10, pp.707-717, 1997. 10.1016\/s0950-5849(97)00023-2","DOI":"10.1016\/S0950-5849(97)00023-2"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] J.P.M. Meine and A.R. Miguel, \u201cThe effectiveness of software diversity in a large population of programs,\u201d IEEE Trans. Softw. Eng., vol.34, pp.753-764, 2008.","DOI":"10.1109\/TSE.2008.70"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] M. Garcia, A. Bessani, I. Gashi, N. Neves, and R. Obelheiro, \u201cOS diversity for intrusion tolerance: Myth or reality?,\u201d 2011 IEEE\/IFIP 41st International Conf. on Dependable Systems & Networks (DSN), Hong Kong, China, pp.383-394, June 2011, 10.1109\/dsn.2011.5958251","DOI":"10.1109\/DSN.2011.5958251"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] D. Ma, L. Wang, C. Lei, Z. Xu, H. Zhang, and M. Li, \u201cPoster: quantitative security assessment method based on entropy for moving target defense,\u201d Proc. 2017 ACM on Asia Conference on Computer and Communications Security., Abu Dhabi, United Arab Emirates, pp.920-922, April 2017. 10.1145\/3052973.3055161","DOI":"10.1145\/3052973.3055161"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] W. Connell, D.A. Menasc\u00e9, and M. Albanese, \u201cPerformance modeling of moving target defenses,\u201d Proc. 2017 ACM Workshop on Moving Target Defense, Dallas, TX, USA, pp.53-63, Oct. 2017. 10.1145\/3140549.3140550","DOI":"10.1145\/3140549.3140550"},{"key":"22","unstructured":"[22] Y. Wang, Q. Duan, and D. Simmons, \u201cSecurity evaluation using software diversity measurement: An ecological approach,\u201d Proc. International Conf. SERP, p.95, 2016."},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] D. Posnett, R. D'Souza, P. Devanbu, and V. Filkov, \u201cDual ecological measures of focus in software development,\u201d 2013 35th International Conference on Software Engineering (ICSE), San Francisco, CA, pp.452-461, 2013. 10.1109\/icse.2013.6606591","DOI":"10.1109\/ICSE.2013.6606591"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] M. Zhang, L. Wang, S. Jajodia, A. Singhal, and M. Albanese, \u201cNetwork diversity: a security metric for evaluating the resilience of networks against zero-day attacks,\u201d IEEE Trans. Inf. Forensics Security, vol.11, no.5, pp.1071-1086, 2016. 10.1109\/tifs.2016.2516916","DOI":"10.1109\/TIFS.2016.2516916"},{"key":"25","unstructured":"[25] A.K. Thukral, \u201cMeasurement of diversity in characterization of biological communities,\u201d Information Theory and Optimization Techniques in Scientific Research, pp.89-98, 2010."},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] S. Jones, A. Outkin, J. Gearhart, J. Hobbs, J. Siirola, C. Phillips, S. Verzi, D. Tauritz, S. Mulder, and A. Naugle, \u201cEvaluating moving target defense with pladd,\u201d Sandia National Laboratories, 2015.","DOI":"10.2172\/1222986"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] H. Maleki, S. Valizadeh, W. Koch, A. Bestavros, and M. van Dijk, \u201cMarkov modeling of moving target defense games,\u201d Proc. 2016 ACM Workshop on Moving Target Defense, Vienna, Austria, pp.81-92, Oct. 2016. 10.1145\/2995272.2995273","DOI":"10.1145\/2995272.2995273"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/10\/E102.D_2018EDP7414\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T23:26:09Z","timestamp":1570231569000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E102.D\/10\/E102.D_2018EDP7414\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,1]]},"references-count":27,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2018edp7414","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,1]]}}}