Reducing attack surface via executable transformation

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations

    Abstract

    Modern software development and deployment practices encourage complexity and bloat while unintentionally sacrificing efficiency and security. A major driver in this is the overwhelming emphasis on programmers' productivity. The constant demands to speed up development while reducing costs have forced a series of individual decisions and approaches throughout software engineering history that have led to this point. The current state-of-The-practice in the field is a patchwork of architectures and frameworks, packed full of features in order to appeal to: The greatest number of people, obscure use cases, maximal code reuse, and minimal developer effort. The Office of Naval Research (ONR) Total Platform Cyber Protection (TPCP) program seeks to de-bloat software binaries late in the life-cycle with little or no access to the source code or the development process.

    Original languageEnglish (US)
    Title of host publicationProceedings - 2018 IEEE Cybersecurity Development Conference, SecDev 2018
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages138
    Number of pages1
    ISBN (Electronic)9781538676622
    DOIs
    StatePublished - Nov 21 2018
    Event3rd Annual IEEE Cybersecurity Development Conference, SecDev 2018 - Cambridge, United States
    Duration: Sep 30 2018Oct 2 2018

    Publication series

    NameProceedings - 2018 IEEE Cybersecurity Development Conference, SecDev 2018

    Conference

    Conference3rd Annual IEEE Cybersecurity Development Conference, SecDev 2018
    Country/TerritoryUnited States
    CityCambridge
    Period9/30/1810/2/18

    All Science Journal Classification (ASJC) codes

    • Computer Networks and Communications
    • Software
    • Safety, Risk, Reliability and Quality

    Fingerprint

    Dive into the research topics of 'Reducing attack surface via executable transformation'. Together they form a unique fingerprint.

    Cite this