Anderson, R. Why information security is hard – an economic perspective. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC) (2001), pp. 358–365.
Google Scholar
Ansel, J., Arya, K., and Cooperman, G. DMTCP: Transparent checkpointing for cluster computations and the desktop. In Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium (IPDPS) (2009), pp. 1–12.
Google Scholar
Apache. Apache HTTP server project. http://httpd.apache.org, 2014.
Araujo, F., and Hamlen, K. W. Compiler-instrumented, dynamic secret-redaction of legacy processes for attacker deception. In Proceedings of the 24th USENIX Security Symposium (2015).
Google Scholar
Araujo, F., Hamlen, K. W., Biedermann, S., and Katzenbeisser, S. From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation. In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS) (2014), pp. 942–953.
Google Scholar
Araujo, F., Shapouri, M., Pandey, S., and Hamlen, K. Experiences with honey-patching in active cyber security education. In Proceedings of the 8th Workshop on Cyber Security Experimentation and Test (CSET) (2015).
Google Scholar
Bringer, M. L., Chelmecki, C. A., and Fujinoki, H. A survey: Recent advances and future trends in honeypot research. International Journal of Computer Network and Information Security 4, 10 (2012).
CrossRef
Google Scholar
Clang. clang.llvm.org. http://clang.llvm.org.
Clark, C., Fraser, K., Hand, S., Hansen, J. G., Jul, E., Limpach, C., Pratt, I., and Warfield, A. Live migration of virtual machines. In Proceedings of the 2nd Symposium on Networked Systems Design & Implementation (NSDI) (2005), vol. 2, pp. 273–286.
Google Scholar
Corbet, J. TCP Connection Repair. http://lwn.net/Articles/495304, 2012.
CRIU. Checkpoint/Restore In Userspace. http://criu.org, 2014.
Dalton, M., Kannan, H., and Kozyrakis, C. Tainting is not pointless. ACM/SIGOPS Operating Systems Review (OSR) 44, 2 (2010), 88–92.
CrossRef
Google Scholar
DFSan. Clang DataFlowSanitizer. http://clang.llvm.org/docs/DataFlowSanitizer.html.
Duell, J. The design and implementation of Berkeley Lab’s Linux checkpoint/restart. Tech. Rep. LBNL-54941, U. California at Berkeley, 2002.
Google Scholar
Gerofi, B., Fujita, H., and Ishikawa, Y. An efficient process live migration mechanism for load balanced distributed virtual environments. In Proceedings of the IEEE International Conference on Cluster Computing (CLUSTER) (2010), pp. 197–206.
Google Scholar
Google. Protocol Buffers. https://code.google.com/p/protobuf, 2014.
Google. Web metrics. https://developers.google.com/speed/articles/web-metrics, 2014.
Juels, A. A bodyguard of lies: the use of honey objects in information security. In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (2014), ACM, pp. 1–4.
Google Scholar
Kang, M. G., McCamant, S., Poosankam, P., and Song, D. DTA++: Dynamic taint analysis with targeted control-flow propagation. In Proceedings of the 18th Annual Network & Distributed System Security Symposium (NDSS) (2011).
Google Scholar
Kerckhoffs, A. La cryptographie militaire. Journal Sciences Militaires IX (1883), 5–38.
Google Scholar
Lattner, C., and Adve, V. S. LLVM: A compilation framework for lifelong program analysis & transformation. In Proceedings of the 2nd IEEE/ACM International Symposium on Code Generation and Optimization: Feedback-directed and Runtime Optimization (CGO) (2004), pp. 75–88.
Google Scholar
Lighttpd. Lighttpd server project. http://www.lighttpd.net, 2014.
LXC. Linux containers. http://linuxcontainers.org, 2014.
Merkow, M. S., and Breithaupt, J.
Information Security: Principles and Practices. Pearson Education, 2014.
Google Scholar
Miloi
\( \rm\acute{J} \)
čić, D. S., Douglis, F., Paindaveine, Y., Wheeler, R., and Zhou, S. Process migration. ACM Computing Surveys 32, 3 (2000), 241–299.
Google Scholar
Netcraft. Are there really lots of vulnerable Apache web servers? http://news.netcraft.com/archives/2014/02/07, 2014.
Nginx. Nginx server project. http://nginx.org, 2014.
NIST. The Shellshock Bash Vulnerability. https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271, Sep. 2014.
Ohloh. Apache HTTP server statistics. http://www.ohloh.net/p/apache, 2014.
Pai, V. S., Druschel, P., and Zwaenepoel, W. Flash: An efficient and portable web server. In Proceedings of the USENIX Annual Technical Conference (ATEC) (1999), pp. 15–15.
Google Scholar
Pingree, L. Emerging Technology Analysis: Deception Techniques and Technologies Create Security Technology Business Opportunities. Gartner, Inc. (July 2015). ID:G00278434.
Google Scholar
Provos, N. A virtual honeypot framework. In Proceedings of the 13th USENIX Security Symposium (2004), vol. 173.
Google Scholar
Schwartz, E. J., Avgerinos, T., and Brumley, D. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proceedings of the 31st IEEE Symposium on Security & Privacy (S&P) (2010), pp. 317–331.
Google Scholar
Slowinska, A., and Bos, H. Pointless tainting?: Evaluating the practicality of pointer tainting. In Proceedings of the 4th ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys) (2009), pp. 61–74.
Google Scholar
Spitzner, L.
Honeypots: Tracking Hackers. Addison-Wesley Longman, 2002.
Google Scholar
Spitzner, L. The honeynet project: Trapping the hackers. IEEE Security & Privacy, 2 (2003), 15–23.
CrossRef
Google Scholar
Thonnard, O., and Dacier, M. A framework for attack patterns’ discovery in honeynet data. Digital Investigation 5, Supplement (2008), S128 – S139. The Proceedings of the 8th Annual DFRWS Conference.
Google Scholar
Voris, J., Jermyn, J., Boggs, N., and Stolfo, S. Fox in the trap: thwarting masqueraders via automated decoy document deployment. In Proceedings of the 8th ACM European Workshop on System Security (2015), p. 3.
Google Scholar
Wang, C., Mueller, F., Engelmann, C., and Scott, S. L. Proactive process-level live migration in HPC environments. In Proceedings of the ACM/IEEE Conference on Supercomputing (2008).
Google Scholar
Whitaker, A., Cox, R. S., Shaw, M., and Gribble, S. D. Constructing services with interposable virtual hardware. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI) (2004), pp. 169–182.
Google Scholar
Yuill, J., Zappe, M., Denning, D., and Feer, F. Honeyfiles: Deceptive files for intrusion detection. In Proceedings of the 5th IEEE International Workshop on Information Assurance (2004), pp. 116–122.
Google Scholar