Software singularization definition

Software singularization. The idea is to generate different variants for each deployment. The differentiation is created on the software binary with a differentiation ranging from simple identity Software remote control and monitoring: Software executable artefacts can be modified to insert monitoring probes (i.e., typically inserted at each instruction block of the software flow graph) to infer abnormal execution patterns collected and analysed either at the same execution platform or in a remote centralized workstation. Identically, the same artefacts can be modified to check at run-time their integrity. The centralized control solution would make certain that tampered variants execution stops and that only variants which show regular execution pattern keep running. A rollback to the original form of the artefacts can be initiated from a tampering detection.
Software singularization. The idea is to generate different variants for each deployment. The differentiation is created on the software binary with a differentiation ranging from simple identity secret appending (on the same untouched binary for all deployments) to the most complex scheme where each line of code is rewritten/reordered. While the former scheme provides one identification label possibly gathered at a centralized MANO, the latter employs MTD in the context of vulnerability exploitation attack. Software remote control and monitoring: Software executable artefacts can be modified to insert monitoring probes (i.e., typically inserted at each instruction block of the software flow graph) to infer abnormal execution patterns collected and analysed either at the same execution platform or in a remote centralized workstation. Identically, the same artefacts can be modified to check at run-time their integrity. The centralized control solution would make certain that tampered variants execution stops and that only variants which show regular execution pattern keep running. A rollback to the original form of the artefacts can be initiated from a tampering detection.