Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of self-healing to automatically recover from an attack, self-healing faces some obstacles before it can protect legacy applications and COTS (Commercial Off-The-Shelf) software. Besides the practical issue of not modifying source code, self-healing must know both when to engage and how to guide a repair. Previous work on a self-healing system, STEM, left these challenges as future work. This paper improves STEM's capabilities along three lines to provide practical speculative execution for automated defense (SEAD). First, STEM is now applicable to COTS software: it does not require sour...
Computer systems are subject to a range of attacks that can compromise their intended operations. C...
We propose to use automatic workarounds to achieve self-healing in software systems. We observe that...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...
Most computer defense systems crash the process that they protect as part of their response to an at...
We propose a reactive approach for handling a wide variety of software failures, ranging from remote...
The introduction of self-healing capabilities to software systems could offer a way to alter the cur...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...
We propose a new approach for reacting to a wide variety of software failures, ranging from remotely...
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide r...
Abstract. The introduction of self-healing capabilities to software systems could offer a way to alt...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...
Complex computer systems are plagued with bugs and vulnerabilities. Worms such as SQL Slammer and hi...
The increasing sophistication of software attacks has created the need for increasingly finer-graine...
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide r...
Current embryonic attempts at software self-healing produce mechanisms that are often oblivious to t...
Computer systems are subject to a range of attacks that can compromise their intended operations. C...
We propose to use automatic workarounds to achieve self-healing in software systems. We observe that...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...
Most computer defense systems crash the process that they protect as part of their response to an at...
We propose a reactive approach for handling a wide variety of software failures, ranging from remote...
The introduction of self-healing capabilities to software systems could offer a way to alter the cur...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...
We propose a new approach for reacting to a wide variety of software failures, ranging from remotely...
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide r...
Abstract. The introduction of self-healing capabilities to software systems could offer a way to alt...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...
Complex computer systems are plagued with bugs and vulnerabilities. Worms such as SQL Slammer and hi...
The increasing sophistication of software attacks has created the need for increasingly finer-graine...
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide r...
Current embryonic attempts at software self-healing produce mechanisms that are often oblivious to t...
Computer systems are subject to a range of attacks that can compromise their intended operations. C...
We propose to use automatic workarounds to achieve self-healing in software systems. We observe that...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...