International audienceDespite the deployment of preventive security mechanisms to protect the assets and computing platforms of users, intrusions eventually occur. We propose a novel intrusion survivability approach to withstand ongoing intrusions. Our approach relies on an orchestration of fine-grained recovery and per-service responses (e.g., privileges removal). Such an approach may put the system into a degraded mode. This degraded mode prevents attackers to reinfect the system or to achieve their goals if they managed to reinfect it. It maintains the availability of core functions while waiting forpatches to be deployed. We devised a cost-sensitive response selection process to ensure that while the service is in a degraded mode, its c...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Survivability is a new branch of dependability. It addresses explicit requirements for restricted mo...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
Previous works have studied how to use proactive recovery to build intrusion-tolerant replicated sys...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Survivability is a new branch of dependability. It addresses explicit requirements for restricted mo...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
Previous works have studied how to use proactive recovery to build intrusion-tolerant replicated sys...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Survivability is a new branch of dependability. It addresses explicit requirements for restricted mo...