US 11,748,490 B2
Computer system with moving target defenses against vulnerability attacks
Todd Austin, Ann Arbor, MI (US); Valeria Bertacco, Ann Arbor, MI (US); Mark Gallagher, Ann Arbor, MI (US); and Baris Kasikci, Ann Arbor, MI (US)
Assigned to REGENTS OF THE UNIVERSITY OF MICHIGAN, Ann Arbor, MI (US)
Filed by REGENTS OF THE UNIVERSITY OF MICHIGAN, Ann Arbor, MI (US)
Filed on Dec. 30, 2021, as Appl. No. 17/566,053.
Application 17/566,053 is a continuation of application No. 16/546,850, filed on Aug. 21, 2019, granted, now 11,232,212.
Claims priority of provisional application 62/720,489, filed on Aug. 21, 2018.
Prior Publication US 2022/0129563 A1, Apr. 28, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/57 (2013.01); G06F 8/65 (2018.01); G06F 21/55 (2013.01); G06F 21/56 (2013.01); G06F 21/60 (2013.01); H04L 9/08 (2006.01)
CPC G06F 21/577 (2013.01) [G06F 8/65 (2013.01); G06F 21/552 (2013.01); G06F 21/554 (2013.01); G06F 21/566 (2013.01); G06F 21/602 (2013.01); H04L 9/0869 (2013.01); G06F 2221/0751 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A computer-implemented method of securing a computer system against unauthorized access from an unauthorized agent, the method comprising:
assigning one or more attack information assets, stored in the computer system and targetable by an unauthorized agent to exploit a vulnerability of the computer system, as corresponding to one or more information domains including at least one of a code domain, a code pointer domain, a data object domain, a data object pointer domain, a relative distance between data objects domain, or an operation timing domain; and
for each information domain to which attack information assets were assigned, protecting the one or more attack information assets assigned to the information domain using one or more composable moving target defense layers of protection each having a respective churn cycle and a corresponding respective churn rate, wherein protecting the attack information assets includes reconfiguring each respective churn cycle at the corresponding respective churn rate.