{"id":"https://openalex.org/W2897873646","doi":"https://doi.org/10.1145/3268966.3268969","title":"A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services","display_name":"A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services","publication_year":2018,"publication_date":"2018-01-15","ids":{"openalex":"https://openalex.org/W2897873646","doi":"https://doi.org/10.1145/3268966.3268969","mag":"2897873646"},"language":"en","primary_location":{"id":"doi:10.1145/3268966.3268969","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3268966.3268969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091458171","display_name":"Dieudonn\u00e9 Mulamba","orcid":null},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dieudonne Mulamba","raw_affiliation_strings":["Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055287095","display_name":"Athith Amarnath","orcid":null},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Athith Amarnath","raw_affiliation_strings":["Colorado State University, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Colorado State University, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026447333","display_name":"Bruhadeshwar Bezawada","orcid":"https://orcid.org/0000-0002-1021-8121"},"institutions":[{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bruhadeshwar Bezawada","raw_affiliation_strings":["Colorado State University, FORT COLLINS, CO, USA"],"affiliations":[{"raw_affiliation_string":"Colorado State University, FORT COLLINS, CO, USA","institution_ids":["https://openalex.org/I92446798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102938076","display_name":"Indrajit Ray","orcid":"https://orcid.org/0000-0002-3612-7738"},"institutions":[{"id":"https://openalex.org/I1311060795","display_name":"U.S. National Science Foundation","ror":"https://ror.org/021nxhr62","country_code":"US","type":"funder","lineage":["https://openalex.org/I1311060795"]},{"id":"https://openalex.org/I92446798","display_name":"Colorado State University","ror":"https://ror.org/03k1gpj17","country_code":"US","type":"education","lineage":["https://openalex.org/I92446798"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Indrajit Ray","raw_affiliation_strings":["Colorado State University &amp; National Science Foundation, Fort Collins, CO, USA"],"affiliations":[{"raw_affiliation_string":"Colorado State University &amp; National Science Foundation, Fort Collins, CO, USA","institution_ids":["https://openalex.org/I1311060795","https://openalex.org/I92446798"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091458171"],"corresponding_institution_ids":["https://openalex.org/I92446798"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14065676,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"59","last_page":"68"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7811940312385559},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7231569290161133},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7030248641967773},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.5617445111274719},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5134900212287903},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49368366599082947},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.45417946577072144},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4222731292247772},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.30864059925079346},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.21767741441726685}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7811940312385559},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7231569290161133},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7030248641967773},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.5617445111274719},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5134900212287903},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49368366599082947},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.45417946577072144},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4222731292247772},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.30864059925079346},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.21767741441726685},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3268966.3268969","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3268966.3268969","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[{"id":"https://openalex.org/G2283761334","display_name":null,"funder_award_id":"DE-NE0008571","funder_id":"https://openalex.org/F4320337674","funder_display_name":"Wind Energy Technologies Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306084","display_name":"U.S. Department of Energy","ror":"https://ror.org/01bj3aw27"},{"id":"https://openalex.org/F4320309374","display_name":"Ohio State University","ror":"https://ror.org/00rs6vg23"},{"id":"https://openalex.org/F4320337674","display_name":"Wind Energy Technologies Office","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W41015297","https://openalex.org/W1568546821","https://openalex.org/W1587054347","https://openalex.org/W1698117324","https://openalex.org/W1885156594","https://openalex.org/W1992147365","https://openalex.org/W1993881789","https://openalex.org/W1995327224","https://openalex.org/W1999588868","https://openalex.org/W2019890995","https://openalex.org/W2020593266","https://openalex.org/W2059325500","https://openalex.org/W2119741407","https://openalex.org/W2126087831","https://openalex.org/W2139224653","https://openalex.org/W2250039092","https://openalex.org/W2251304588","https://openalex.org/W2388109147","https://openalex.org/W2532467204","https://openalex.org/W2534313446","https://openalex.org/W2536759866","https://openalex.org/W2564170758","https://openalex.org/W2589098023","https://openalex.org/W2593833939","https://openalex.org/W2678227210","https://openalex.org/W2782579083","https://openalex.org/W2963218066","https://openalex.org/W3137092842","https://openalex.org/W6678832241"],"related_works":["https://openalex.org/W2092530219","https://openalex.org/W2388464034","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W2105580438","https://openalex.org/W2057435755","https://openalex.org/W3121798572","https://openalex.org/W2018782216","https://openalex.org/W2112897043","https://openalex.org/W2047416510"],"abstract_inverted_index":{"Protection":[0],"of":[1,17,37,48,116,124,143,155,174,215,222,233,247],"security-critical":[2,83,138],"services,":[3],"such":[4,86],"as":[5,250],"access-control":[6],"reference":[7,99],"monitors,":[8],"is":[9,119],"an":[10,71,185],"important":[11],"requirement":[12],"in":[13],"the":[14,27,41,46,49,54,62,76,98,122,128,137,153,156,164,172,175,179,194,207,251],"modern":[15],"era":[16],"distributed":[18],"systems":[19],"and":[20,57,69,161,197],"services.":[21],"The":[22,113],"threat":[23],"arises":[24],"from":[25],"hosting":[26,178],"service":[28,50,101,133,139,157,210],"on":[29,61,75,92],"a":[30,34,132,141,202,213,219,238],"single":[31],"server":[32,177,239],"for":[33,96,106],"lengthy":[35],"period":[36],"time,":[38],"which":[39,235],"allows":[40],"attacker":[42,129,165],"to":[43,53,81,110,120,130,149],"periodically":[44,135],"enumerate":[45],"vulnerabilities":[47],"with":[51],"respect":[52],"server's":[55],"configuration":[56],"launch":[58],"targeted":[59],"attacks":[60],"service.":[63,180],"In":[64],"our":[65,94,117,228],"work,":[66],"we":[67,90,183],"design":[68],"implement":[70],"efficient":[72,160,186],"solution":[73,95],"based":[74],"moving":[77,136],"\"target\"":[78],"defense":[79],"strategy,":[80],"protect":[82],"services":[84],"against":[85],"active":[87,253],"adversaries.":[88],"Specifically,":[89],"focus":[91],"implementing":[93],"protecting":[97],"monitor":[100],"that":[102,192,205,227,237],"enforces":[103],"access":[104,109,208],"control":[105,209,242],"users":[107],"requesting":[108],"sensitive":[111],"resources.":[112],"key":[114],"intuition":[115],"approach":[118,148,229],"increase":[121],"level":[123],"difficulty":[125],"faced":[126],"by":[127,134],"compromise":[131],"among":[140,212],"group":[142,214],"heterogeneous":[144],"servers.":[145],"For":[146],"this":[147],"be":[150,159],"practically":[151],"feasible,":[152],"movement":[154],"should":[158,166],"random,":[162],"i.e.,":[163],"not":[167],"have":[168],"a-priori":[169],"information":[170],"about":[171],"choice":[173],"next":[176,252],"Towards":[181],"this,":[182],"describe":[184],"Byzantine":[187,231],"fault-tolerant":[188],"leader":[189],"election":[190],"protocol":[191],"achieves":[193],"desired":[195],"security":[196],"performance":[198],"objectives.":[199],"We":[200,225],"built":[201],"prototype":[203],"implementation":[204],"moves":[206],"randomly":[211],"fifty":[216],"servers":[217],"within":[218],"time":[220],"range":[221],"250-440":[223],"ms.":[224],"show":[226],"tolerates":[230],"behavior":[232],"servers,":[234],"ensures":[236],"under":[240],"adversarial":[241],"has":[243],"no":[244],"additional":[245],"advantage":[246],"being":[248],"selected":[249],"server.":[254]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
