Current embryonic attempts at software self-healing produce mechanisms that are often oblivious to the semantics of the code they supervise. We believe that, in order to help inform runtime repair strategies, such systems require a more detailed analysis of dynamic application behavior. We describe how to profile an application by analyzing all function calls (including library and system) made by a process. We create predictability profiles of the return values of those function calls. Self-healing mechanisms that rely on a transactional approach to repair (that is, rolling back execution to a known safe point in control flow or slicing off the current function sequence) can benefit from these return value predictability profiles. Profiles...
Researchers are always looking for better ways to improve their vulnerabilities detection and analys...
Software systems will eventually contribute to their own maintenance using implementations of self-a...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...
Current embryonic attempts at software self–healing produce mechanisms that are often oblivious to t...
The increasing sophistication of software attacks has created the need for increasingly finer-graine...
Most current approaches to self-healing software (SHS) suffer from semantic incorrectness of the res...
Heterogeneity, mobility, complexity and new application domains raise new software reliability issue...
The introduction of self-healing capabilities to software systems could offer a way to alter the cur...
Abstract. Heterogeneity, mobility, complexity and new application domains raise new soft-ware reliab...
We propose a reactive approach for handling a wide variety of software failures, ranging from remote...
Most computer defense systems crash the process that they protect as part of their response to an at...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...
Automated intrusion prevention and self-healing software are active areas of security systems resear...
We propose to use automatic workarounds to achieve self-healing in software systems. We observe that...
Many current systems security research efforts focus on mechanisms for Intrusion Prevention and Self...
Researchers are always looking for better ways to improve their vulnerabilities detection and analys...
Software systems will eventually contribute to their own maintenance using implementations of self-a...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...
Current embryonic attempts at software self–healing produce mechanisms that are often oblivious to t...
The increasing sophistication of software attacks has created the need for increasingly finer-graine...
Most current approaches to self-healing software (SHS) suffer from semantic incorrectness of the res...
Heterogeneity, mobility, complexity and new application domains raise new software reliability issue...
The introduction of self-healing capabilities to software systems could offer a way to alter the cur...
Abstract. Heterogeneity, mobility, complexity and new application domains raise new soft-ware reliab...
We propose a reactive approach for handling a wide variety of software failures, ranging from remote...
Most computer defense systems crash the process that they protect as part of their response to an at...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...
Automated intrusion prevention and self-healing software are active areas of security systems resear...
We propose to use automatic workarounds to achieve self-healing in software systems. We observe that...
Many current systems security research efforts focus on mechanisms for Intrusion Prevention and Self...
Researchers are always looking for better ways to improve their vulnerabilities detection and analys...
Software systems will eventually contribute to their own maintenance using implementations of self-a...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...