First ACM Workshop on Moving Target Defense (MTD 2014)
in conjunction with the 21st ACM Conference on Computer and Communications Security (CCS)
November 3, 2014, Scottsdale, Arizona, USA

Call for Papers
The static nature of current computing systems has made them easy to attack and harder to defend. Adversaries have an asymmetric advantage in that they have the time to study a system, identify its vulnerabilities, and choose the time and place of attack to gain the maximum benefit. The idea of moving-target defense (MTD) is to impose the same asymmetric disadvantage on the attacker by making systems dynamic and harder to predict. With a constantly changing system and its ever adapting attack surface, the attacker will have to deal with a great deal of uncertainty just like defenders do today. The ultimate goal is to level the cybersecurity playing field for defenders versus attackers.

This workshop seeks to bring together researchers from academia, government, and industry to report on the latest research efforts on moving-target defense, and to have productive discussion and constructive debate on this topic. We solicit submissions on original research in the broad area of MTD, with possible topics such as those listed below. Since this is still a research area in a nascent stage, the list should only be used as a reference. We welcome all works that fall under the broad scope of moving target defense, including research that shows negative results.

  • System randomization
  • Artificial diversity
  • Cyber maneuver
  • Bio-inspired defenses
  • Dynamic network configuration
  • Moving target in the cloud
  • System diversification techniquesk
  • Dynamic compilation techniques
  • Adaptive defenses
  • Analytical models for MTD
  • Large-scale MTD (using multiple techniques)


Paper Submissions
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions including references should be at most 10 pages in the ACM double-column format, excluding well-marked appendices, and at most 12 pages in total. Submissions are not required to be anonymized.

Submissions are to be made to the submission web site at Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of July 22, 2014 to be considered. Notification of acceptance or rejection will be sent to authors by August 22, 2014. Authors of accepted papers must guarantee that one of the authors will register and present the paper at the workshop. Proceedings of the workshop will be available on a CD to the workshop attendees and will become part of the ACM Digital Library.

Important Dates

Keynote Speakers
George Cybenko, Dartmouth College

Patrick D. McDaniel, Pennsylvania State University

8:25 - 8: 30
Welcome Message
8:30 - 9:15 No Free Lunch in Cyber Security
George Cybenko     slides
9:15 - 10:00 Security and Science of Agility
Patrick D. McDaniel   slides
  Technical Session I
10:00 - 10:30 A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses
Kevin Carter, James Riordan and Hamed Okhravi
10:30 - 11:00

Coffee Break

11:00 - 11:30

Towards A Theory of Moving Target Defense
Rui Zhuang, Scott A. Deloach and Xinming Ou

11:30 - 12:00 On the Challenges of Effective Movement
Thomas Hobson, Hamed Okhravi, David Bigelow, Robert Rudd and William Streilein
12:00 - 13:00 Lunch Break
  Technical Session II
13:00 - 13:30 Reinforcement learning algorithms for adaptive cyber defense against Heartbleed
Minghui Zhu, Zhisheng Hu and Peng Liu
13:30 - 14:00 Moving Target Defense for Hardening the Security of the Power System State Estimation
Mohammad Rahman, Rakesh B. Bobba and Ehab Al-Shaer
14:00 - 14:30 Spatiotemporal Address Mutation for Proactive Cyber Agility Against Sophisticated Attackers
Jafar Haadi Jafarian, Ehab Al-Shaer and Qi Duan
14:30 - 15:00 Coffee Break
  Technical Session III
15:00 - 15:30 Software Security and Randomization through Program Partitioning and Circuit Variation
Todd Andel, Lindsey Whitehurst and Jeffrey McDonald     slides
15:30 - 16:00 Software Profiling Options and Their Effects on Security Based Code Diversification
Mark Murphy, Per Larsen, Stefan Brunthaler and Michael Franz
16:00 - 16:30 Comparing Different Moving Target Defense Techniques
Jun Xu, Pinyao Guo, Mingyi Zhao, Robert F. Erbacher, Minghui Zhu and Peng Liu
16:30 - 17:00 Wrap up


PC Chairs

Sushil Jajodia, George Mason University
Kun Sun, College of William and Mary

Program Committee

Massimiliano Albanese, George Mason University
Ehab Al-Shaer, University of North Carolina - Charlotte
George Cybenko, Dartmouth College
Alessandra De Benedictis, University of Naples
Scott DeLoach, Kansas State University
Yuval Elovici, Ben-Gurion University
Rob Erbacher, Army Research Laboratory
Michael Franz, University of California, Irvine
Dijiang Huang, Arizona State University
Angelos Keromytis, Columbia University
Jason Li, Intelligent Automation, Inc
Peng Liu, Pennsylvania State University
Tom Longstaff, National Security Agency
Patrick McDaniel, Pennsylvania State University
Prasant Mohapatra, University of California, Davis
Sanjai Narain, Applied Communication Sciences
Hamed Okhravi, MIT Lincoln Laboratory
Xinming Ou, Kansas State University
Radha Poovendran, University of Washington
Kui Ren, State University of New York at Buffalo
Vipin Swarup, The MITRE Corporation
Cliff Wang, Army Research Office
Zhan Wang, Chinese Academy of Sciences

Publicity Chair

Sara Foresti, University of Milan

Web Chair

Chong Guan, Chinese Academy of Sciences


Updated: April 15, 2014