Table 1: A comparison of transformation-based cyber security methods.

Number Method Diversity Provided
1 Instruction Set Randomization (ISR) Changes the processor instruction set to foil cyberattacks
2 Address Space Randomization (ASR) Used by Windows Vista OS to resist memory corruption attacks
3 Data Space Randomization (DSR) Uses masking to prevent memory corruption better than ASR
4 N-Variant Approaches If the same input is supplied to a set of diversified variants of the same code, then the cyberattack will succeed on at most one variant.
5 Multi-Variant Code This technique runs variants of the same program and compares the behavior of the variants at synchronization points
6 Behavioral Distance A way to defend against mimicry attacks by using a comparison between the behaviors of two diverse processes running the same input.
7 Semantic Randomization A way to apply schema-based program synthesis to automatically create semantically equivalent syntactically distinct algorithmic variants of the same code, where a cyberattack will succeed on at most one variant. Picks up where the use of distinct compilers leaves off. May be used in combination with the above methods for enhanced cybersecurity.