The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (2009 vol. 7)
ISSN: 1540-7993
pp: 14-17
Fred B. Schneider , Cornell University
Kenneth P. Birman , Cornell University
ABSTRACT
Conventional wisdom holds that software monocultures are exceptionally vulnerable to malware outbreaks. The authors argue that this oversimplifies and misleads. An analysis based on attacker reactions likely to be evoked by successive generations of defenses suggests that deploying a monoculture in conjunction with automated diversity is indeed a very sensible defense today.
INDEX TERMS
networked information system security, monoculture, artificial diversity, stack randomization, configuration attack, technology attack, trust attack.
CITATION
Fred B. Schneider, Kenneth P. Birman, "The Monoculture Risk Put into Context", IEEE Security & Privacy, vol. 7, no. , pp. 14-17, January/February 2009, doi:10.1109/MSP.2009.24
528 ms
(Ver )