WDB@X@A\ uMJ MKvOFUX2@`ZCPMJjB(JRh LPAAQJ UMNH_D^@P^JD F\JYL@y4c\[WAQIAD@D[ ]IH(NHIDs9_P\JQI]zYFIEVz[ ]IH9pQJ LHDJ VI\LCfA\ jQkjUmo^moRS^gQimWQ,f/%EDL#J ]_ H' AI9A QJLDQ_d Q\\DQ+2%_1#]FQk(5#,2^^D#hZ0VL_DZ I  HLIDr1]H 9X D 9Z I1,DLL3C_'N ^LI_LTBUL^ C'DLC *K ,G%,K%WEQY@U\1U(B'[Qf-ns@MOUVO X OH I^MKV@MYUW߿O VMRU__ X ZZ IMMI tURԱUU^MKIkZñFR [H R_M )),, X\y\ .G,;ohs!g9 1k~$%g8*="0G>'{10-|?*r3!wsfc0%~"~hs*r3!ws"r=!n}-wsu&}7v"-|? 1ktUf|UbpPi|Per$dw i fuR`fnG,QDVp&Nav̷aaarm(Vv&NqEpVIh1Z,#`$:5D?TjB$ -Ttap[3Z$\P9$aTg$7k5E4Z4Tb+A*G/t+*va̧k(V&N(Vwj=>V҂30ڂ76և<6ڇ0M1C-W0,{2}6w0~,eaw&j0e8Os88,i4:8oJ /!:hu>}0I0*u0u>:iu1:!::%8w"U_ڪ¨ٝ㛢劬ڥը³Ü在ȁ̄ɆںǦcbl;Ėg|5Nߝ||¢rjÎp|5{ߋn;5mɟr;S\P;z|Üv~-;xzۊc9yx׊eDrzՆa|Tkј{K՞b|Û7mɟr9݊djшr;͒+P0 srV('e*;k2@0r_k'V"5qsr*3@/`G*2 }6Ad2y}/d(g*`Y4P$I2025-02-27 00:59:31 info: [Puppeteer Page] Got cookies, applying... 8\r3 1aGy(ZF&[j$ 'aGo:paQ{&)j^).[x"M)ys[6Xn7MycIl&L,h,Cb&+"Xg:Flm)>C( Ab!DZi GVFz7DZ`DLk9"wN!9 FhP9\nKE~PiFT|X FoVox ^r} kP;Kh9f52025-02-27 00:59:31 info: [Puppeteer Page] Attempting direct fetch of https://isis.vanderbilt.edu/bibcite/export/bibtex/bibcite_reference/1131 W"WW٧0WَW%(UUZ[ZZԁZDu2025-02-27 00:59:31 info: [Puppeteer File-Downloader] Attempting to download asset directly... ,P[ @NL R NolFJ^_ N\Jv__ OG NB_V+http/1.1@inproceedings{1131, keywords = {security, real-time, moving-target defenses, moving target defenses, cyber}, author = {Nathan Burow and Ryan Burrow and Roger Khazan and Howard Shrobe and Bryan Ward}, title = {Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems}, abstract = {Moving-target defenses (MTDs) have been widely studied for common general-purpose and enterprise-computing applications. Indeed, such work has produced highly effective, low-overhead defenses that are now commonly deployed in many systems today. One application space that has seen comparatively little focus is that of safety- and mission-critical systems, which are often real-time systems (RTS) with temporal requirements. Furthermore, such systems are increasingly being targeted by attackers, such as in industrial control systems (ICS), including power grids. The strict timing requirements of these systems presents a different design objective than is common in general-purpose applications — systems should be designed around the worst-case performance, rather than the average case. Perhaps in part due to these alternative design considerations, many real-time systems have not benefited from much of the work on software security that common general-purpose and enterprise applications have, despite the ubiquity of real-time systems that actively control so many applications we as a society have come to rely on, from power generation and distribution, to automotive and avionic applications, and many others.This paper explores the application of moving-target defenses in the context of real-time systems. In particular, the worst-case performance of several address-space randomization defenses are evaluated to study the implications of such designs in real-time applications. These results suggest that current moving-target defenses, while performant in the average case, can exhibit significant tail latencies, which can be problematic in real-time applications, especially if such overheads are not considered in the design and analysis of the system. These results inform future research directions for moving-target defenses in real-time applications.}, year = {2020}, journal = {ACM Workshop on Moving Target Defense (MTD)}, pages = {81–89}, month = {11/2020}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, isbn = {9781450380850}, url = {https://doi.org/10.1145/3411496.3421224}, doi = {10.1145/3411496.3421224}, } HT_ k$`r2?{"u#wr2?ij2)ujTW|}#q5* 6w~7bpe"~pq3c*0p>f%am͊2ZOP'jv仁³ֳߨ򁪽׼̨桃桃桃ͰާͰ桃桃桃ﭶƫڕƾڵತ֣֫׽󆢀ֶ䆢򆢀󆢀ڕƾ򆣇䭁٢вز仁𯕲ز壣훭ƧƼ㣣Ƽ޼Dz偪—򹑨œŚч'ƁTn |T2mJ}7|`DzZ*|T2= UTaL9Jmg*\D?UO>S4L BJ_D:$5?R2N#FL'TuvfG> <_q '} : 44qй 7ޡW =GiީR`ŢSf!ϯ'j̩WRg#ϫ!̹xeS;},4-b2!w,4c,4e=/d=!xkl`(2}:bkk7y=b %e.'b.d(22s4e,lv%!d,.*=2uebe=/d=!xkzb<%2/)d,2*;M4ly-b!ebu:3' 2sb$pt"q ~v)Qy! xQpy#xxmD@I(ݐ)ʏۋ$?۶+Ԗ9ۘ ǻ(*aܛo҇oЌ>ڑoyЇ { t܄ut߆utF27_M($s+q}<:i-01|:26 IH4Mn1H.qC\m/A[W.>Od8%E<@i9Cj< _i Me9C8qC_i.Ec3(H.gCo8dU>e'hNO/.TˋlmY'Ejlggl+h3˃gl}tˏm%ߚzg3ߪ01>˭HHM٧08˛Fjt :X?B0fZ؅1)Բ*!B-}Lؤ!+fZؔpYvXtW̓}!!u$YwQ98y S|yDD`y ՔONMz ED OF ^Yc ,Wl++θk)[ƽ_XM?_o*>ZDF K ^"P QZFLVTULLV '[FL|PZV({TX{]/y%W UV%WWVu@?dn2Z~>R2X5#8+99U$>?5B99C?)^hlJr?_34@""f$3\rz*Jr8D'7r /^DjnD">P">DDjy^$+E\t_9(15R"9_ $uS%t_4>NH 3FI .T 98W94X(B?5QK#/D3/C17?5B?7Z22Z$"9=P#2@<"?.F 5?5/A "0EK34[1)_?5?.X#vT#>RE=:_}8Y$>Xr&r.D ra$/Fjt#2EH&:X5)T?S~+^9_32B8Y$)_%/YjRrw9(U &>D:Bra*z*rw":A >F8y S|yD6>D"y D8/B#aI9(_~-W4>D97BH5?CI95R(uF tF27_1/_ >($)Y7vE".U%)W }8Y$)Y <:T<2B}?_6.E&>Z}8Y 7S}5S'4D #vU =+W9(Y}9Y>?EK2:E4x[95?5B>/| "7\r3B ( I2E#u@>?S22Z~>R2X5#8+99U$>?5B99C?)