Conference on Computer and Communications
Security. [9 Oct. 2014].
Alfred, GB, & Gray, EH 1998, ‘Data Farming: A
metatechnique for Research in the 21st Century.’
Maneuver Warfare Science, pp. 93-99.
Barry, P, & Koehler, M 2004, ‘Simulation in context:
using data farming for decision support", Proceedings
of the 2004 Winter Simulation Conference. vol. 1. pp.
814-819. Available from: IEEE XPlore Digital
Library.
Bonneau, J 2012, ‘The Science of Guessing: Analyzing an
Anonymized Corpus of 70 Million Passwords.’ 2012
IEEE Symposium on Security and Privacy. Available
from: IEEE Xplore Digital Library.
Bumiller, E 2010, Army Leak Suspect Is Turned In, by Ex-
Hacker, The New York Times. Available from:
<http://www.nytimes.com/2010/06/08/world/08leaks.h
tml?_r=0>. [09 Oct. 2014].
Corelan Team n.d, Corelan ROPdb. Available from: <
https://www.corelan.be/index.php/security/corelan-
ropdb/>. [23 Oct. 2014].
Cox, B, Evans, D, Filipi, A, Rowanhill, J 2006, ‘N-Variant
Systems A Secretless Framework for Security through
Diversity’, Proceedings from the 15th Usenix Security
Symposium. Available from: <http://www.cs.virginia.
edu/nvariant/>.
Denning, DE 1987, ‘An Intrusion-Detection Model’, IEEE
Trans. on Software Eng., vol. SE-13, no. 2, pp. 222-
232.
Franz, M 2010, ‘E Unibus Pluram: Massive-scale
Software Diversity as a Defense Mechanism’,
Proceedings of the 2010 Workshop on New Security
Paradigms, pp. 7-16. Available from: ACM Portal:
ACM Digital Library.
Greenwald, G, MacAskill, E, & Poitras, L 2013, Edward
Snowden: The Whistleblower Behind the NSA
Surveillance Revalations, The Guardian. Available
from: <http://www.theguardian.com/world/2013/jun/
09/edward-snowden-nsa-whistleblower-surveillance>.
[9 Oct. 2014].
Homescu, A, Neisius, S, Larsen, P, Brunthaler, S & Franz,
M 2013, ‘Profile-guided automated software
diversity’, Proceedings of the 2013 International
Symposium on Code Generation and Optimization, pp
204-214. Available from: IEEE Xplore Digital
Library.
Horne, GE, and Meyer, TE 2004, ‘Data farming:
Discovering surprise’, Proceedings of the 36th
conference on Winter simulation, pp.807-813.
Kirkpatrick, S, Gelatt, CD, Vecchi, MP, 1983,
‘Optimization by Simulated Annealing’, Science, New
Series, vol. 58, no. 2, pp. 671-680.
Mark, J 2014, T.J. Maxx Theft Believed Largest Hack
Ever. Available from: <http://www.msnbc.com>. [09
Oct 2014].
Mitchell, M 1996, An Introduction to Genetic Algorithms,
MIT Press, Cambridge.
Okhravi, H, Hobson, T, Bigelow, & D, Streilein W 2014,
‘Finding Focus in the Blur of Moving Target
Techniques’ IEEE Security and Privacy, vol. 12, no. 2,
pp. 16-26.
Pal, P, Schantz, R, Paulos, A, Benyo, B 2014, ‘Managed
Execution Environment as a Moving-Target Defense
Infrastructure’. IEEE Security & Privacy, vol. 12, no.
2. pp. 51-59.
Priest, B, Vuksani, E, Wagner, N, Tello, B, Carter, K,
Streilein, W. 2015, ‘Agent-Based Simulation in
Support of Moving Target Cyber Defense Technology
Development and Evaluation’, Proceedings of the
ACM Spring Simulation Multi-Conference
(SpringSim’15).
CVE-2014-0160 2014, MITRE Corporation. 2014.
Available from: <https://cve.mitre.org/cgi-bin/
cvename.cgi?name=CVE-2014-0160>. [09 Oct. 2014].
CVE-2014-7169 2014, MITRE Corporation. Sept. 2014.
Available from: <https://cve.mitre.org/cgi-bin/
cvename.cgi?name=CVE-2014-0160>. [09 Oct. 2014].
Data Breach FAQ, Target. Inc. Available from:
<https://corporate.target.com/about/shopping-
experience/payment-card-issue-faq> [07 Oct 2014].
Data Execution Prevention: Frequently Asked Questions
n.d. Microsoft Corporation. Available from: <
http://windows.microsoft.com/en-us/windows-
vista/data-execution-prevention-frequently-asked-
questions>. [09 Oct. 2014].
The Home Depot Provides Update on Breach
Investigation, The Home Depot, Inc. Available from:
<https://corporate.homedepot.com/mediacenter/pages/
statement1.aspx>. [8 Sept. 2014].
SimulationbasedEvaluationofaCodeDiversificationStrategy
43