In this paper, online system-level self-healing support is presented for embedded systems. Different from off-line log analysis methods used by conventional intrusion detection systems, our research focuses on analyzing runtime kernel data structures hence perform self-diagnosis and self-healing. Inside the infrastructure, self-diagnosis and self-healing solutions have been implemented based on several selected critical kernel data structures. They can fully represent current system status and are also closely related with system resources. At runtime once any system inconsistency has been detected, predefined recovery functions are invoked. Our prototype is developed based on a lightweight virtual machine monitor, above on which the monito...
One of the important design criteria for distributed systems and their applications is their reliabi...
Abstract — A potential threat to embedded systems is the execution of unknown or malicious software ...
Computer systems are subject to a range of attacks that can compromise their intended operations. C...
In this paper we describe our approach to improve dependability of a commodity OS for embedded syste...
Abstract — our main motive research paper is towards intrusion-tolerant server’s to provide full fun...
We propose a new approach for reacting to a wide variety of software failures, ranging from remotely...
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide r...
Abstract. The introduction of self-healing capabilities to software systems could offer a way to alt...
To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of a self...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...
Self-healing is one of the main challenges to growing autonomic pervasive computing. Fault detection...
The introduction of self-healing capabilities to software systems could offer a way to alter the cur...
Software complexity in embedded systems is continuously increasing while embedded computing platform...
This thesis introduces a comprehensive approach for making a particular class of embedded processors...
One of the important design criteria for distributed systems and their applications is their reliabi...
Abstract — A potential threat to embedded systems is the execution of unknown or malicious software ...
Computer systems are subject to a range of attacks that can compromise their intended operations. C...
In this paper we describe our approach to improve dependability of a commodity OS for embedded syste...
Abstract — our main motive research paper is towards intrusion-tolerant server’s to provide full fun...
We propose a new approach for reacting to a wide variety of software failures, ranging from remotely...
The rapid advancement of networking, computing, sensing, and control systems has introduced a wide r...
Abstract. The introduction of self-healing capabilities to software systems could offer a way to alt...
To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of a self...
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...
Self-healing is one of the main challenges to growing autonomic pervasive computing. Fault detection...
The introduction of self-healing capabilities to software systems could offer a way to alter the cur...
Software complexity in embedded systems is continuously increasing while embedded computing platform...
This thesis introduces a comprehensive approach for making a particular class of embedded processors...
One of the important design criteria for distributed systems and their applications is their reliabi...
Abstract — A potential threat to embedded systems is the execution of unknown or malicious software ...
Computer systems are subject to a range of attacks that can compromise their intended operations. C...