Number |
Method |
Diversity Provided |
1 |
Instruction Set Randomization (ISR) |
Changes the processor instruction set to foil cyberattacks |
2 |
Address Space Randomization (ASR) |
Used by Windows Vista OS to resist memory corruption attacks |
3 |
Data Space Randomization (DSR) |
Uses masking to prevent memory corruption better than ASR |
4 |
N-Variant Approaches |
If the same input is supplied to a set of diversified variants of the same code, then the cyberattack will succeed on at most one variant. |
5 |
Multi-Variant Code |
This technique runs variants of the same program and compares the behavior of the variants at synchronization points |
6 |
Behavioral Distance |
A way to defend against mimicry attacks by using a comparison between the behaviors of two diverse processes running the same input. |
7 |
Semantic Randomization |
A way to apply schema-based program synthesis to automatically create semantically equivalent syntactically distinct algorithmic variants of the same code, where a cyberattack will succeed on at most one variant. Picks up where the use of distinct compilers leaves off. May be used in combination with the above methods for enhanced cybersecurity. |