Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Moving Target Defense - Evasive Maneuvers in Cyberspace

via YouTube

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore moving target defense strategies and evasive maneuvers in cyberspace through this informative conference talk. Delve into attack patterns, security design principles, and the concept of adequate protection. Examine why vulnerable assets sometimes escape exploitation and compromise. Learn about various moving target defense techniques, including Address Space Layout Randomization (ASLR), Instruction Set Randomization (ISR), Kernel Interface Diversification, Compiler-Generated Diversity, and Data Structure Layout Randomization. Analyze the entropy problem and scalable binary diversification. Gain insights into the theoretical framework for an MTD strategy and potential resistance to these approaches. Engage in a thought-provoking discussion on the future of cybersecurity defenses.

Syllabus

Introduction
Attack Patterns
Security Design Principle of Adequate Protection
A Hopeless Defense
Why Do Vulnerable Assets Escape Exploitation and Compromise?
Moving Target Defense
Managing the Attack Surface
Address Space Layout Randomization (ASLR)
Instruction Set Randomization (ISR)
Kernel Interface Diversification
Compiler-Generated Diversity
Data Structure Layout Randomization
The Entropy Problem
Scalable Binary Diversification
Theoretical framework for an MTD Strategy
Resistance to MTD Strategy
Discussion

Reviews

Start your review of Moving Target Defense - Evasive Maneuvers in Cyberspace

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.