메뉴 건너뛰기




Volumn , Issue , 2009, Pages 37-48

ASSURE: Automatic software self-healing using REscue points

Author keywords

Binary patching; Checkpoint restart; Error recovery; Reliable software; Software self healing

Indexed keywords

APPLICATION PROGRAMS; AVAILABILITY; CODES (SYMBOLS); COMPUTER OPERATING SYSTEMS; COMPUTER SYSTEM RECOVERY; ERRORS; RECOVERY;

EID: 67650079927     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1508244.1508250     Document Type: Conference Paper
Times cited : (40)

References (32)
  • 2
    • 0003897448 scopus 로고
    • Unpublished Briefing, Dec.
    • J. Boyd. Patterns of Conflict. Unpublished Briefing, http: //www.d-n-i.net/boyd/pdf/poc.pdf, Dec. 1986.
    • (1986) Patterns of Conflict
    • Boyd, J.1
  • 4
    • 35048885595 scopus 로고    scopus 로고
    • Creating vulnerability signatures using weakest preconditions
    • DOI 10.1109/CSF.2007.17, 4271657, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
    • D. Brumley, H. Wang, S. Jha, and D. Song. Creating Vulnerability Signatures Using Weakest Preconditions. In Proceedings of the 20th IEEE Computer Security Foundations Symposium, pages 311-325, July 2007. (Pubitemid 47554222)
    • (2007) Proceedings - IEEE Computer Security Foundations Symposium , pp. 311-325
    • Brumley, D.1    Wang, H.2    Jha, S.3    Song, D.4
  • 15
    • 0025557712 scopus 로고
    • Study of the reliability of UNIX utilities
    • DOI 10.1145/96267.96279
    • B. P. Miller, L. Fredriksen, and B. So. An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM, 33(12):32-44, Dec. 1990. (Pubitemid 21731525)
    • (1990) Communications of the ACM , vol.33 , Issue.12 , pp. 32-44
    • Miller Barton, P.1    Fredriksen Lars2    So Bryan3
  • 21
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A System For Detecting Network Intruders In Real-Time. Computer Networks, 31(23-24):2435-2463, Dec. 1999. (Pubitemid 30869661)
    • (1999) Computer Networks , vol.31 , Issue.23 , pp. 2435-2463
    • Paxson, V.1
  • 22
    • 33845429905 scopus 로고    scopus 로고
    • Rx: Treating bugs as allergies- A safe method to survive software failures
    • DOI 10.1145/1095809.1095833
    • F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating Bugs As Allergies-A Safe Method To Survive Software Failures. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005), pages 235-248, Oct. 2005. (Pubitemid 44892216)
    • (2005) Operating Systems Review (ACM) , vol.39 , Issue.5 , pp. 235-248
    • Qin, F.1    Tucek, J.2    Sundaresan, J.3    Zhou, Y.4
  • 29
    • 0026170711 scopus 로고
    • Software defects and their impact on system availability--A study of field failures in operating systems
    • 91 Fault-Tolerant Comput. Symp.
    • M. Sullivan and R. Chillarege. Software Defects and Their Impact on System Availability-A Study of Field Failures In Operating Systems. In Proceedings of the 21st International Symposium on Fault-Tolerant Computing (FTCS-21), pages 2-9, June 1991. (Pubitemid 21704526)
    • (1991) Digest of Papers - FTCS (Fault-Tolerant Computing Symposium) , pp. 2-9
    • Sullivan Mark1    Chillarege Ram2
  • 31
    • 34548043748 scopus 로고    scopus 로고
    • Sweeper: A lightweight end-to-end system for defending against fast worms
    • DOI 10.1145/1272996.1273010, Operating Systems Review - Proceedings of the 2007 EuroSys Conference
    • J. Tucek, J. Newsome, S. Lu, C. Huang, S. Xanthos, D. Brumley, Y. Zhou, and D. Song. Sweeper: A Lightweight End-To- End System For Defending Against Fast Worms. In Proceedings of the 2nd European Conference on Computer Systems (EuroSys 2007), pages 115-128, Mar. 2007. (Pubitemid 47281579)
    • (2007) Operating Systems Review (ACM) , pp. 115-128
    • Tucek, J.1    Lu, S.2    Huang, C.3    Xanthos, S.4    Zhou, Y.5    Newsome, J.6    Brumley, D.7    Song, D.8
  • 32
    • 21844456680 scopus 로고    scopus 로고
    • Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
    • DOI 10.1145/1030194.1015489, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
    • H. J.Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters For Preventing Known Vulnerability Exploits. In Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2004), pages 193-204, Aug. 2004. (Pubitemid 40954880)
    • (2004) Computer Communication Review , vol.34 , Issue.4 , pp. 193-204
    • Wang, H.J.1    Guo, C.2    Simon, D.R.3    Zugenmaier, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.