{"id":"https://openalex.org/W2112643522","doi":"https://doi.org/10.1109/cns.2013.6682756","title":"A secure architecture design based on application isolation, code minimization and randomization","display_name":"A secure architecture design based on application isolation, code minimization and randomization","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2112643522","doi":"https://doi.org/10.1109/cns.2013.6682756","mag":"2112643522"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2013.6682756","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2013.6682756","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101970169","display_name":"Aditi Gupta","orcid":"https://orcid.org/0000-0003-3647-8148"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aditi Gupta","raw_affiliation_strings":["Purdue University, West Lafayette, IN","Purdue University West Lafayette IN USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Purdue University West Lafayette IN USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062386207","display_name":"Michael S. Kirkpatrick","orcid":"https://orcid.org/0000-0002-7200-4102"},"institutions":[{"id":"https://openalex.org/I11883440","display_name":"James Madison University","ror":"https://ror.org/028pmsz77","country_code":"US","type":"education","lineage":["https://openalex.org/I11883440"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael S. Kirkpatrick","raw_affiliation_strings":["James Madison University, Harrisonbourg, VA","James Madison Univ., Madison, VA, USA"],"affiliations":[{"raw_affiliation_string":"James Madison University, Harrisonbourg, VA","institution_ids":["https://openalex.org/I11883440"]},{"raw_affiliation_string":"James Madison Univ., Madison, VA, USA","institution_ids":["https://openalex.org/I11883440"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Purdue University, West Lafayette, IN","Purdue University West Lafayette IN USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Purdue University West Lafayette IN USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101970169"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.4809,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.76912927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"40","issue":null,"first_page":"423","last_page":"429"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.7959520816802979},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7934878468513489},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6327801942825317},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5556619763374329},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.554737389087677},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.547325849533081},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5343602895736694},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4712653160095215},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45167723298072815},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.44281813502311707},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.43639639019966125},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.43587806820869446},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3701320290565491},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2602633237838745},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.10047268867492676},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.09813746809959412}],"concepts":[{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.7959520816802979},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7934878468513489},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6327801942825317},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5556619763374329},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.554737389087677},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.547325849533081},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5343602895736694},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4712653160095215},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45167723298072815},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.44281813502311707},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.43639639019966125},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.43587806820869446},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3701320290565491},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2602633237838745},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.10047268867492676},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.09813746809959412},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns.2013.6682756","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2013.6682756","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W26267215","https://openalex.org/W136211262","https://openalex.org/W155216046","https://openalex.org/W1980296610","https://openalex.org/W2086277109","https://openalex.org/W2111817346","https://openalex.org/W2114402262","https://openalex.org/W2119055825","https://openalex.org/W2135359801","https://openalex.org/W2144219822","https://openalex.org/W2154435823","https://openalex.org/W6601083115","https://openalex.org/W6677689127"],"related_works":["https://openalex.org/W2387089893","https://openalex.org/W2295077932","https://openalex.org/W2402565116","https://openalex.org/W2589805430","https://openalex.org/W2921892740","https://openalex.org/W1844720873","https://openalex.org/W2060746033","https://openalex.org/W4253678082","https://openalex.org/W1584602698","https://openalex.org/W2347476215"],"abstract_inverted_index":{"With":[0],"fast":[1],"evolving":[2],"attacks,":[3],"using":[4],"software":[5,9,128],"patches":[6],"for":[7],"fixing":[8],"bugs":[10],"is":[11,95,143],"not":[12],"enough":[13],"as":[14,120],"there":[15],"are":[16],"often":[17],"considerable":[18],"delays":[19],"in":[20],"their":[21],"application":[22,86,94,134],"to":[23,33,81,97,108,145],"vulnerable":[24],"systems":[25],"and":[26,72,115],"the":[27,63,102,110,113,127,148],"attackers":[28],"may":[29],"find":[30],"other":[31,99],"vulnerabilities":[32],"exploit.":[34],"A":[35],"secure":[36],"architecture":[37,80],"design":[38,51,60,77],"that":[39,66,89,142],"provides":[40],"robust":[41],"protection":[42],"against":[43],"malware":[44],"must":[45],"be":[46],"guided":[47],"by":[48,131,151],"strong":[49],"security":[50,64],"principles.":[52],"In":[53],"this":[54],"work,":[55],"we":[56,124],"propose":[57],"a":[58,90,152],"system":[59,114,140],"based":[61],"on":[62,135],"principles":[65],"aim":[67],"at":[68],"achieving":[69],"isolation,":[70],"diversification":[71],"reducing":[73],"attack":[74,129],"surface.":[75],"Our":[76],"leverages":[78],"multi-core":[79],"enforce":[82],"physical":[83],"isolation":[84],"between":[85],"processes":[87],"so":[88],"malicious":[91],"or":[92],"infected":[93],"unable":[96],"affect":[98],"parts":[100],"of":[101,112],"system.":[103],"We":[104],"use":[105],"randomization":[106],"techniques":[107],"increase":[109],"entropy":[111],"thwart":[116],"various":[117],"attacks":[118],"such":[119],"code-reuse":[121],"attacks.":[122],"Further,":[123],"significantly":[125],"reduce":[126],"surface":[130],"executing":[132],"each":[133],"its":[136],"own":[137],"customized":[138],"operating":[139],"image":[141],"minimized":[144],"only":[146],"contain":[147],"code":[149],"required":[150],"given":[153],"application.":[154]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
