National audienceThis paper presents a work-in-progress of our approach for intrusion survivability in commodity operating systems. Our approach relies on an orchestration of recovery and mitigation actions. We rollback infected services (i.e., their processes) and infected files to a previous known safe state, and we apply per-service mitigations (i.e., privileges removal) before unfreezing the restored processes. Such approach effectively puts the previously compromised service into a degraded mode, allowing the system to withstand ongoing intrusions and ensures the availability of core functions to the users. A prototype for Linux-based systems is currently in development
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...