International audienceDespite the deployment of preventive security mechanisms to protect the assets and computing platforms of users, intrusions eventually occur. We propose a novel intrusion survivability approach to withstand ongoing intrusions. Our approach relies on an orchestration of fine-grained recovery and per-service responses (e.g., privileges removal). Such an approach may put the system into a degraded mode. This degraded mode prevents attackers to reinfect the system or to achieve their goals if they managed to reinfect it. It maintains the availability of core functions while waiting for patches to be deployed. We devised a cost-sensitive response selection process to ensure that while the service is in a degraded mode, its ...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...
Computing platforms, such as embedded systems or laptops, are built with layers of preventive securi...