Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - Imparting malware resistance with a randomizing compiler

Submitted by wheelbarrio
wheelbarrio (1784594) writes "From an Economist article — inspired by the natural resistance offered to pathogens by genetically diverse host populations, Dr Michael Franz at UCI suggests that common software be similarly hardened against attack by generating a unique executable for each install. It sounds like a cute idea, although the article doesn't provide examples of what kinds of diversity are possible whilst maintaining the program logic, nor what kind of attacks would be prevented with this approach."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Imparting malware resistance with a randomizing compiler

Comments Filter:

Porsche: there simply is no substitute. -- Risky Business

Working...