Characterizing Self-Healing Software Systems
@inproceedings{Keromytis2007CharacterizingSS, title={Characterizing Self-Healing Software Systems}, author={A. Keromytis}, year={2007} }
The introduction of self-healing capabilities to software systems could offer a way to alter the current, unfavorable imbalance in the software security arms race. Consequently, self-healing software systems have emerged as a research area of particular interest in recent years. Motivated by the inability of traditional techniques to guarantee software integrity and availability, especially against motivated human adversaries, self-healing approaches are meant to complement existing approaches… CONTINUE READING
Figures from this paper
Figures
23 Citations
FastFix: A Control Theoretic View of Self-Healing for Automatic Corrective Software Maintenance
- Computer Science
- Scalable Comput. Pract. Exp.
- 2012
- 2
- PDF
Industrial experiences from evolving measurement systems into self‐healing systems for improved availability
- Engineering, Computer Science
- Softw. Pract. Exp.
- 2018
- 10
Self-healing multitier architectures using cascading rescue points
- Computer Science
- ACSAC '12
- 2012
- 10
- PDF
REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points
- Computer Science
- IWSEC
- 2011
- 25
- PDF
Biological Inspired Intrusion Prevention and Self- healing System for Network Security Based on Danger Theory
- Engineering
- 2009
- 5
- PDF
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
- Computer Science
- IEEE Transactions on Dependable and Secure Computing
- 2013
- 37
- PDF
Intrusion detection and self healing model for network security
- Engineering
- 2011 7th International Conference on Next Generation Web Services Practices
- 2011
- 5
- Highly Influenced
References
SHOWING 1-10 OF 50 REFERENCES
From STEM to SEAD: Speculative Execution for Automated Defense
- Computer Science
- USENIX Annual Technical Conference
- 2007
- 32
- PDF
Building a Reactive Immune System for Software Services
- Computer Science
- USENIX Annual Technical Conference, General Track
- 2005
- 180
- PDF
Integrating Flexible Support for Security Policies into the Linux Operating System
- Computer Science
- USENIX Annual Technical Conference, FREENIX Track
- 2001
- 656
- PDF
MOPS: an infrastructure for examining security properties of software
- Computer Science
- CCS '02
- 2002
- 452
- PDF
Speculative virtual verification: policy-constrained speculative execution
- Computer Science
- NSPW '05
- 2005
- 4
- PDF