Corpus ID: 14713865

Characterizing Self-Healing Software Systems

@inproceedings{Keromytis2007CharacterizingSS,
  title={Characterizing Self-Healing Software Systems},
  author={A. Keromytis},
  year={2007}
}
  • A. Keromytis
  • Published 2007
  • The introduction of self-healing capabilities to software systems could offer a way to alter the current, unfavorable imbalance in the software security arms race. Consequently, self-healing software systems have emerged as a research area of particular interest in recent years. Motivated by the inability of traditional techniques to guarantee software integrity and availability, especially against motivated human adversaries, self-healing approaches are meant to complement existing approaches… CONTINUE READING
    23 Citations

    Figures from this paper

    A Survey of Self Healing of Software Faults: Recent Advances and Research Challenges
    • PDF
    Self-healing multitier architectures using cascading rescue points
    • 10
    • PDF
    Duration : 30 months D 6 . 1 : State-ofthe-art in Self-Healing and Patch Generation
    • 2011
    • PDF
    Analysis and defense of vulnerabilities in binary code
    • 12
    • PDF
    SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
    • G. Chen, H. Jin, +4 authors X. Shi
    • Computer Science
    • IEEE Transactions on Dependable and Secure Computing
    • 2013
    • 37
    • PDF
    Intrusion detection and self healing model for network security
    • 5
    • Highly Influenced

    References

    SHOWING 1-10 OF 50 REFERENCES
    Quantifying Application Behavior Space for Detection and Self-Healing
    • 7
    • PDF
    From STEM to SEAD: Speculative Execution for Automated Defense
    • 32
    • PDF
    Building a Reactive Immune System for Software Services
    • 180
    • PDF
    Software Self-Healing Using Collaborative Application Communities
    • 68
    • PDF
    A holistic approach to service survivability
    • 57
    • PDF
    An evaluation of the recovery-related properties of software faults
    • 14
    • PDF
    Integrating Flexible Support for Security Policies into the Linux Operating System
    • 656
    • PDF
    MOPS: an infrastructure for examining security properties of software
    • 452
    • PDF
    Acceptability-oriented computing
    • 65
    • Highly Influential
    • PDF
    Speculative virtual verification: policy-constrained speculative execution
    • 4
    • PDF