Figure 4 - uploaded by Julio Hernandez-Castro
Content may be subject to copyright.
Source publication
In this work, we briefly introduce and discuss some of the diversity measures
used in Ecology. After a succinct description and analysis of the most relevant
ones, we single out the Shannon-Weiner index. We justify why it is the most
informative and relevant one for measuring software diversity. Then, we show
how it can be used for effectively asse...
Context in source publication
Context 1
... the figures shown in Table 3.1, the diversity of this ecosystem is 3.971 esn . This is still too low in comparison with living ecosystems, and a clear demonstration of the poor diversity of this market. Of course, the real figures will lay somewhere in between these two values of 1.386 and 3.971 esn , possibly much closer to the lower due to millions of common lines of code between many of the OS that we treat here as different. In any case, these figures reveal that added diversity is much needed in this ecosystem for increased security. A much more surprising finding in the course of our research is that the Desktop Operating System market is not the only with a worryingly low diversity, and that it is not even the worst offender. The values shown in figure 4 lead to a shocking diversity measure of 1.269 esn , even worse that the one for the Desktop PC operating ...
Similar publications
With the tremendous growth of published news articles, a key issue is how to help users find diverse and interesting news stories. To this end, it is crucial to understand and build accurate profiles for both users and news articles. In this paper, we define a user profile based on (1) the set of entities she/he talked about it in her/his comments...
The propagation techniques and the payload of Duqu have been closely studied
over the past year and it has been said that Duqu shared functionalities with
Stuxnet. We focused on the driver used by Duqu during the infection, our
contribution consists in reverse-engineering the driver: we rebuilt its source
code and analyzed the mechanisms it uses to...
Citations
Suppose you assessed or analyzed the resilience of a system using approaches described in Part II of this book or similar approaches. Chances are, you determined that the resilience of the system is inadequate, at least in part. What should you do to improve it? This is the theme of Part III of this book: methods, techniques, and approaches to enhancing cyber resilience of a system, either via an appropriate initial design or by adding mitigation measures or by defensive actions during a cyberattack.