{"id":"https://openalex.org/W2950281362","doi":"https://doi.org/10.1145/3314058.3317723","title":"A formal verification of mutation-based moving target defense","display_name":"A formal verification of mutation-based moving target defense","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2950281362","doi":"https://doi.org/10.1145/3314058.3317723","mag":"2950281362"},"language":"en","primary_location":{"id":"doi:10.1145/3314058.3317723","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3314058.3317723","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101869315","display_name":"Muhammad Abdul Basit Ur Rahim","orcid":"https://orcid.org/0000-0003-3024-3794"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Muhammad Abdul Basit Ur Rahim","raw_affiliation_strings":["University of North Carolina"],"affiliations":[{"raw_affiliation_string":"University of North Carolina","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101713020","display_name":"Qi Duan","orcid":"https://orcid.org/0000-0002-6168-5192"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qi Duan","raw_affiliation_strings":["University of North Carolina"],"affiliations":[{"raw_affiliation_string":"University of North Carolina","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043893479","display_name":"Ehab Al\u2010Shaer","orcid":"https://orcid.org/0000-0002-7665-8293"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ehab Al-Shaer","raw_affiliation_strings":["University of North Carolina"],"affiliations":[{"raw_affiliation_string":"University of North Carolina","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101869315"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06815407,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.9016205072402954},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8317800760269165},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.818723201751709},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.6631166934967041},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6428812146186829},{"id":"https://openalex.org/keywords/runtime-verification","display_name":"Runtime verification","score":0.598234236240387},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5219266414642334},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.5050037503242493},{"id":"https://openalex.org/keywords/functional-verification","display_name":"Functional verification","score":0.49732211232185364},{"id":"https://openalex.org/keywords/automaton","display_name":"Automaton","score":0.48953256011009216},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.4696829915046692},{"id":"https://openalex.org/keywords/deadlock","display_name":"Deadlock","score":0.4286348521709442},{"id":"https://openalex.org/keywords/formal-specification","display_name":"Formal specification","score":0.4119245409965515},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.36025339365005493},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.29027053713798523},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13034650683403015}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.9016205072402954},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8317800760269165},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.818723201751709},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.6631166934967041},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6428812146186829},{"id":"https://openalex.org/C202973057","wikidata":"https://www.wikidata.org/wiki/Q7380130","display_name":"Runtime verification","level":3,"score":0.598234236240387},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5219266414642334},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.5050037503242493},{"id":"https://openalex.org/C62460635","wikidata":"https://www.wikidata.org/wiki/Q5508853","display_name":"Functional verification","level":3,"score":0.49732211232185364},{"id":"https://openalex.org/C112505250","wikidata":"https://www.wikidata.org/wiki/Q787116","display_name":"Automaton","level":2,"score":0.48953256011009216},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.4696829915046692},{"id":"https://openalex.org/C159023740","wikidata":"https://www.wikidata.org/wiki/Q623276","display_name":"Deadlock","level":2,"score":0.4286348521709442},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.4119245409965515},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.36025339365005493},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29027053713798523},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13034650683403015}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3314058.3317723","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3314058.3317723","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1962072139","https://openalex.org/W2106306039","https://openalex.org/W2737078376"],"related_works":["https://openalex.org/W1867637656","https://openalex.org/W112055548","https://openalex.org/W2329232208","https://openalex.org/W3161493205","https://openalex.org/W3036403349","https://openalex.org/W2389907042","https://openalex.org/W2809618173","https://openalex.org/W2528673213","https://openalex.org/W2316546651","https://openalex.org/W2901580792"],"abstract_inverted_index":{"Static":[0],"system":[1,15,115],"configuration":[2,33],"provides":[3],"the":[4,7,11,14,28,38,42,55,76,114,122,130,139,149,154],"advantage":[5],"for":[6,27,99],"attackers":[8],"to":[9,74],"discover":[10],"vulnerabilities":[12],"of":[13,102,129,153],"and":[16,36,45,78,112,120,126,151],"launch":[17],"attacks.":[18],"Moving":[19],"Target":[20],"Defense":[21],"(MTD)":[22],"can":[23],"break":[24],"this":[25,93],"asymmetry":[26],"defenders":[29],"by":[30,52,85],"mutating":[31],"certain":[32],"parameters":[34],"proactively":[35],"at":[37],"same":[39],"time":[40,90],"maintaining":[41],"run-time":[43],"correctness":[44,77],"operational":[46],"integrity.":[47],"MTD":[48,60,103,107,143],"is":[49,72],"essentially":[50],"distributed":[51,69],"nature":[53],"since":[54,80],"processes":[56],"or":[57,88,142],"actions":[58],"in":[59,63],"are":[61],"executed":[62],"an":[64],"interleaved":[65],"manner.":[66],"For":[67],"any":[68],"system,":[70],"it":[71],"important":[73],"verify":[75,121],"integrity,":[79],"they":[81],"may":[82],"be":[83],"jeopardized":[84],"design":[86],"errors":[87],"run":[89],"inconsistencies.":[91],"In":[92],"work":[94],"we":[95],"present":[96],"a":[97],"framework":[98],"formal":[100,110,144,155],"verification":[101,156],"techniques.":[104],"We":[105,132],"describe":[106],"techniques":[108],"with":[109,117],"ontology":[111],"model":[113],"behaviors":[116],"timed":[118],"automata,":[119],"correctness,":[123],"liveness,":[124],"fairness":[125],"deadlock-free":[127],"properties":[128],"system.":[131],"use":[133],"Random":[134],"Host":[135],"Mutation":[136],"(RHM)":[137],"as":[138],"case":[140],"study":[141],"verification.":[145],"Our":[146],"experimentation":[147],"validates":[148],"feasibility":[150],"scalability":[152],"framework.":[157]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
