Many users value applications that continue execution in the face of attacks. Current software protection techniques typically abort a process after an intrusion attempt ({\it e.g.}, a code injection attack). We explore ways in which the security property of integrity can support availability. We extend the Clark-Wilson Integrity Model to provide primitives and rules for specifying and enforcing repair mechanisms and validation of those repairs. Users or administrators can use this model to write or automatically synthesize \emph{repair policy}. The policy can help customize an application's response to attack. We describe two prototype implementations for transparently applying these policies without modifying source code
Modern computer systems are built on a foundation of software components from a variety of vendors. ...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
The pervasive interconnection of systems throughout the world has given computer services a signific...
We propose a new approach for reacting to a wide variety of software failures, ranging from remotely...
Policy engineering for access-control security has traditionally focused on specification and verifi...
Software failures in server applications are a significant problem for preserving system availabilit...
Modern distributed systems are composed from several off-the-shelf components, including operating s...
Automated intrusion prevention and self-healing software are active areas of security systems resear...
Many current systems security research efforts focus on mechanisms for Intrusion Prevention and Self...
Computer intrusions can occur in various ways. Many of them occur by exploiting program flaws and sy...
This paper aims at offering a compact vision of the main solutions that have been proposed to addres...
Software failures in server applications are a significant problem for preserving system availabilit...
This paper offers a new approach to modelling the effect of cyber-attacks on reliability of software...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
Unlike today's reactive approaches, information ow based approaches can provide positive assur...
Modern computer systems are built on a foundation of software components from a variety of vendors. ...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
The pervasive interconnection of systems throughout the world has given computer services a signific...
We propose a new approach for reacting to a wide variety of software failures, ranging from remotely...
Policy engineering for access-control security has traditionally focused on specification and verifi...
Software failures in server applications are a significant problem for preserving system availabilit...
Modern distributed systems are composed from several off-the-shelf components, including operating s...
Automated intrusion prevention and self-healing software are active areas of security systems resear...
Many current systems security research efforts focus on mechanisms for Intrusion Prevention and Self...
Computer intrusions can occur in various ways. Many of them occur by exploiting program flaws and sy...
This paper aims at offering a compact vision of the main solutions that have been proposed to addres...
Software failures in server applications are a significant problem for preserving system availabilit...
This paper offers a new approach to modelling the effect of cyber-attacks on reliability of software...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
Unlike today's reactive approaches, information ow based approaches can provide positive assur...
Modern computer systems are built on a foundation of software components from a variety of vendors. ...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
The pervasive interconnection of systems throughout the world has given computer services a signific...