Jianmin Pang's scientific contributions

Publications (2)

Article
Full-text available
Cyberspace mimic defense has been proven to be a revolutionary defense technology that “changes the rules of the game” to ensure the security of cyberspace. However, the software diversity inherent in mimic defense technology may increase the difficulty in managing software executable binaries, especially when updating or debugging a software. In t...

Citations

... Among multiple possibilities to address corresponding security threats, Security through Diversity is a suitable design approach. While state of the art literature discusses corresponding concepts in generic terms [10][11], specific implementation solutions meeting essential requirements and related testing scenarios need to be developed in order to make the concepts applicable to related RED Articles. Below, we will outline how related concepts can be implemented supporting Article 3(3)(e) and 3(3)(f) requirements through the reconfiguration architecture designs currently developed by ETSI [6]. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 Radio Equipment, Article 3(3)(e) related to Privacy and Article 3(3)(f) related to protection against fraud and cybersecurity. ...
... The first problem before deployment of an application is to decide the right number of variants it needed. In our previous work [19], we propose a software assignment algorithm which can help the user decide the right number of variants for an application defending worm-like attacks. ...