Proceedings of the Second ACM Workshop on Moving Target Defense

G. Cybenko, Dijiang Huang
{"title":"Proceedings of the Second ACM Workshop on Moving Target Defense","authors":"G. Cybenko, Dijiang Huang","doi":"10.1145/2808475","DOIUrl":null,"url":null,"abstract":"It is our great pleasure to welcome you to the 2015 ACM Workshop on Moving Target Defense -- MTD'15. This year's MTD workshop continues its tradition of being the premier forum for presentation of research results and experience reports on leading edge issues of access control, nincluding models, systems, applications, and theory. The mission of the symposium is to share novel access control solutions that fulfill the needs of heterogeneous applications and environments and identify new directions for future research and development. ACRONYM gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of access control. \n \nThe call for papers attracted submissions from Asia, Europe, and United States. Submissions are from both industry and academia. The workshop received 19 submissions. Each submitted paper has at least 3 review comments from TPC members. The program committee reviewed and accepted the following: \nFull Technical Papers submitted 19, accepted 8 \nShort Experience Reports submitted 19, accepted 4 \n \n \n \nWe also encourage attendees to attend the keynote and invited talk presentations. These valuable and insightful talks can and will guide us to a better understanding of the future: \nFrom Fine Grained Code Diversity to Execute-Only-Memory: The Cat and Mouse Game Between Attackers and Defenders Continues, Michael Franz, (University of California, Irvine) \nGetting Beyond Tit for Tat: Better Strategies for Moving Target Prototyping and Evaluation, Hamed Okhravi (MIT Lincoln Laboratory))","PeriodicalId":20578,"journal":{"name":"Proceedings of the Second ACM Workshop on Moving Target Defense","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Second ACM Workshop on Moving Target Defense","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2808475","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

It is our great pleasure to welcome you to the 2015 ACM Workshop on Moving Target Defense -- MTD'15. This year's MTD workshop continues its tradition of being the premier forum for presentation of research results and experience reports on leading edge issues of access control, nincluding models, systems, applications, and theory. The mission of the symposium is to share novel access control solutions that fulfill the needs of heterogeneous applications and environments and identify new directions for future research and development. ACRONYM gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of access control. The call for papers attracted submissions from Asia, Europe, and United States. Submissions are from both industry and academia. The workshop received 19 submissions. Each submitted paper has at least 3 review comments from TPC members. The program committee reviewed and accepted the following: Full Technical Papers submitted 19, accepted 8 Short Experience Reports submitted 19, accepted 4 We also encourage attendees to attend the keynote and invited talk presentations. These valuable and insightful talks can and will guide us to a better understanding of the future: From Fine Grained Code Diversity to Execute-Only-Memory: The Cat and Mouse Game Between Attackers and Defenders Continues, Michael Franz, (University of California, Irvine) Getting Beyond Tit for Tat: Better Strategies for Moving Target Prototyping and Evaluation, Hamed Okhravi (MIT Lincoln Laboratory))
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
第二届美国计算机学会移动目标防御研讨会论文集
我们非常高兴地欢迎您参加2015年ACM移动目标防御研讨会- MTD'15。今年的MTD研讨会延续了其传统,即作为介绍访问控制前沿问题(不包括模型、系统、应用和理论)的研究成果和经验报告的主要论坛。研讨会的任务是分享满足异构应用和环境需求的新颖访问控制解决方案,并确定未来研究和发展的新方向。ACRONYM为研究人员和从业者提供了一个独特的机会,可以与对访问控制的各个方面感兴趣的其他人分享他们的观点。论文征集活动吸引了来自亚洲、欧洲和美国的投稿。参赛作品来自工业界和学术界。工作坊共收到19份意见书。每篇提交的论文至少有3条TPC成员的评审意见。项目委员会审查并接受了以下内容:提交的完整技术论文19篇,接受8篇,提交的简短经验报告19篇,接受4篇。我们还鼓励与会者参加主题演讲和邀请演讲。这些有价值和有见地的谈话可以并将引导我们更好地理解未来:从细粒度代码多样性到仅执行内存:攻击者和防御者之间的猫鼠游戏继续,Michael Franz,(加州大学欧文分校)超越针锋相对:移动目标原型和评估的更好策略,Hamed Okhravi(麻省理工学院林肯实验室))
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses Session details: MTD Modeling and Evaluation II Empirical Game-Theoretic Analysis for Moving Target Defense Proceedings of the Second ACM Workshop on Moving Target Defense Session details: MTD Keynote II
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1