메뉴 건너뛰기




Volumn , Issue , 2009, Pages 49-58

Self-recovery in server programs

Author keywords

Memory propagation; Self cleansing; Self recovery

Indexed keywords

CHECK POINTING; MEMORY CORRUPTION; MEMORY ERROR; MEMORY LOCATIONS; PROGRAM STATE; RESPONSE TIME; ROLL BACK; ROLLBACK RECOVERY; SELF RECOVERY; SOFTWARE BUG; SOFTWARE FAILURE; STATE INFORMATION;

EID: 70450230739     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1542431.1542439     Document Type: Conference Paper
Times cited : (14)

References (33)
  • 1
    • 70450255931 scopus 로고    scopus 로고
    • mysql bug. bugs.mysql.com/bug.php?id=110.
    • mysql bug. bugs.mysql.com/bug.php?id=110.
  • 2
    • 70450268276 scopus 로고    scopus 로고
    • National vulnerability database
    • National vulnerability database. http://nvd.nist.gov/statistics.cfm.
  • 3
    • 84943422723 scopus 로고    scopus 로고
    • Derek Bruening, Timothy Garnett, and Saman Amarasinghe. An infrastructure for adaptive dynamic optimization. In CGO, pages 265-275. IEEE Computer Society, 2003.
    • Derek Bruening, Timothy Garnett, and Saman Amarasinghe. An infrastructure for adaptive dynamic optimization. In CGO, pages 265-275. IEEE Computer Society, 2003.
  • 4
    • 80053199674 scopus 로고    scopus 로고
    • Microreboot - a technique for cheap recovery
    • George Candea, Shinichi Kawamoto, Yuichi Fujiki, Greg Friedman, and Armando Fox. Microreboot - a technique for cheap recovery. In OSDI, pages 31-44, 2004.
    • (2004) OSDI , pp. 31-44
    • Candea, G.1    Kawamoto, S.2    Fujiki, Y.3    Friedman, G.4    Fox, A.5
  • 5
    • 34547335786 scopus 로고    scopus 로고
    • Tainttrace: Efficient flow tracing with dynamic binary rewriting
    • Winnie Cheng, Qin Zhao, Bei Yu, and Scott Hiroshige. Tainttrace: Efficient flow tracing with dynamic binary rewriting. ISCC, pages 749-754,2006.
    • (2006) ISCC , pp. 749-754
    • Cheng, W.1    Zhao, Q.2    Yu, B.3    Hiroshige, S.4
  • 6
    • 57749185043 scopus 로고    scopus 로고
    • Thread-safe binary translation using transactional memory
    • JaeWoong Chung, Michael Dalton, Hari Kannan, and Christos Kozyrakis. Thread-safe binary translation using transactional memory. In HPCA, 2008.
    • (2008) HPCA
    • Chung, J.1    Dalton, M.2    Kannan, H.3    Kozyrakis, C.4
  • 7
    • 85017025817 scopus 로고    scopus 로고
    • Felix Wu, and Frederic T Chong. Minos: Architectural support for protecting control data
    • 359-389
    • Jedidiah R. Crandall, S. Felix Wu, and Frederic T Chong. Minos: Architectural support for protecting control data. ACM Trans. Archit. Code Optim., 3(4):359-389, 2006.
    • (2006) ACM Trans. Archit. Code Optim , vol.3 , Issue.4
    • Jedidiah, R.1    Crandall, S.2
  • 8
    • 35348907867 scopus 로고    scopus 로고
    • Raksha: A flexible information flow architecture for software security
    • Michael Dalton, Hari Kannan, and Christos Kozyrakis. Raksha: a flexible information flow architecture for software security. In ISCA, pages 482-493, 2007.
    • (2007) ISCA , pp. 482-493
    • Dalton, M.1    Kannan, H.2    Kozyrakis, C.3
  • 10
    • 36549014520 scopus 로고    scopus 로고
    • Bugbench: A benchmark for evaluating bug detection tools
    • Shan Lu, Zhenmin Li, Feng Qin, Lin Tan, Pin Zhou, and Yuanyuan Zhou. Bugbench: A benchmark for evaluating bug detection tools. In Bugs, 2005.
    • (2005) Bugs
    • Lu, S.1    Li, Z.2    Qin, F.3    Tan, L.4    Zhou, P.5    Zhou, Y.6
  • 11
    • 28444483117 scopus 로고    scopus 로고
    • The soft error problem: An architectural perspective
    • Shubhendu S. Mukherjee, Joel S. Emer, and Steven K. Reinhardt. The soft error problem: An architectural perspective. In HPCA, pages 243-247, 2005.
    • (2005) HPCA , pp. 243-247
    • Mukherjee, S.S.1    Emer, J.S.2    Reinhardt, S.K.3
  • 12
    • 67650081268 scopus 로고    scopus 로고
    • Architectural support for shadow memory in multiprocessors
    • Vijay Nagarajan and Rajiv Gupta. Architectural support for shadow memory in multiprocessors. In VEE, pages 1-10, 2009.
    • (2009) VEE , pp. 1-10
    • Nagarajan, V.1    Gupta, R.2
  • 13
    • 35448963872 scopus 로고    scopus 로고
    • How to shadow every byte of memory used by a program
    • Nicholas Nethercote and Julian Seward. How to shadow every byte of memory used by a program. In VEE, pages 65-74, 2007a.
    • (2007) VEE , pp. 65-74
    • Nethercote, N.1    Seward, J.2
  • 14
    • 35448955692 scopus 로고    scopus 로고
    • Valgrind: A framework for heavyweight dynamic binary instrumentation
    • Nicholas Nethercote and Julian Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. In PLDI, pages 89-100, 2007b.
    • (2007) PLDI , pp. 89-100
    • Nethercote, N.1    Seward, J.2
  • 15
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 17
    • 77954568726 scopus 로고    scopus 로고
    • Recovery oriented computing: A new research agenda for a new century
    • David A. Patterson. Recovery oriented computing: A new research agenda for a new century. In HPCA, page 247, 2002.
    • (2002) HPCA , pp. 247
    • Patterson, D.A.1
  • 19
    • 33845429905 scopus 로고    scopus 로고
    • Rx: Treating bugs as allergies - a safe method to survive software failures
    • Feng Qin, Joseph Tucek, Jagadeesan Sundaresan, and Yuanyuan Zhou. Rx: treating bugs as allergies - a safe method to survive software failures. In SOSP, pages 235-248, 2005.
    • (2005) SOSP , pp. 235-248
    • Qin, F.1    Tucek, J.2    Sundaresan, J.3    Zhou, Y.4
  • 20
    • 40349087553 scopus 로고    scopus 로고
    • Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks
    • Feng Qin, Cheng Wang, Zhenmin Li, Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO 39, pages 135-148, 2006.
    • (2006) MICRO 39 , pp. 135-148
    • Qin, F.1    Wang, C.2    Li, Z.3
  • 21
    • 0017983255 scopus 로고
    • Reliability issues in computing system design
    • Brian Randell, P. A. Lee, and Philip C. Treleaven. Reliability issues in computing system design. ACM Comput. Surv., 10(2):123-165,1978.
    • (1978) ACM Comput. Surv , vol.10 , Issue.2 , pp. 123-165
    • Brian Randell, P.A.L.1    Treleaven, P.C.2
  • 22
    • 0033726332 scopus 로고    scopus 로고
    • Transient fault detection via simultaneous multithreading
    • Steven K. Reinhardt and Shubhendu S. Mukherjee. Transient fault detection via simultaneous multithreading. In ISCA, pages 25-36, 2000.
    • (2000) ISCA , pp. 25-36
    • Reinhardt, S.K.1    Mukherjee, S.S.2
  • 23
  • 24
    • 84906487819 scopus 로고    scopus 로고
    • Enhancing server availability and security through failure-oblivious computing
    • Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and William S. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, pages 303-316, 2004.
    • (2004) OSDI , pp. 303-316
    • Rinard, M.C.1    Cadar, C.2    Dumitran, D.3    Roy, D.M.4    Leu, T.5    Beebee, W.S.6
  • 26
    • 79959917961 scopus 로고    scopus 로고
    • Flashback: A lightweight extension for rollback and deterministic replay for software debugging
    • Sudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, and Yuanyuan Zhou. Flashback: a lightweight extension for rollback and deterministic replay for software debugging. In ATEC, pages 29-44, 2004.
    • (2004) ATEC , pp. 29-44
    • Srinivasan, S.M.1    Kandula, S.2    Andrews, C.R.3    Zhou, Y.4
  • 27
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. Edward Suh, Jae W. Lee, David Zhang, and Srinivas Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, pages 85-96, 2004.
    • (2004) ASPLOS , pp. 85-96
    • Edward Suh, G.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 28
    • 85077022007 scopus 로고    scopus 로고
    • Recovering device drivers (awarded best paper!)
    • Michael M. Swift, Muthukaruppan Annamalai, Brian N. Bershad, and Henry M. Levy. Recovering device drivers (awarded best paper!). In OSDI, pages 1-16, 2004.
    • (2004) OSDI , pp. 1-16
    • Swift, M.M.1    Annamalai, M.2    Bershad, B.N.3    Levy, H.M.4
  • 29
    • 21644451622 scopus 로고    scopus 로고
    • Improving the reliability of commodity operating systems
    • Michael M. Swift, Brian N. Bershad, and Henry M. Levy. Improving the reliability of commodity operating systems. In SOSP, pages 207-222, 2003.
    • (2003) SOSP , pp. 207-222
    • Swift, M.M.1    Bershad, B.N.2    Levy, H.M.3
  • 30
    • 51949119271 scopus 로고    scopus 로고
    • Avoiding program failures through safe execution perturbations
    • Sriraman Tallam, Chen Tian, Rajiv Gupta, and Xiangyu Zhang. Avoiding program failures through safe execution perturbations. In COMPSAC, pages 152-159, 2008.
    • (2008) COMPSAC , pp. 152-159
    • Tallam, S.1    Tian, C.2    Gupta, R.3    Zhang, X.4
  • 31
    • 0036290674 scopus 로고    scopus 로고
    • Transient-fault recovery using simultaneous multithreading
    • T N. Vijaykumar, Irith Pomeranz, and Karl Cheng. Transient-fault recovery using simultaneous multithreading. In ISCA, pages 87-98, 2002.
    • (2002) ISCA , pp. 87-98
    • Vijaykumar, T.N.1    Pomeranz, I.2    Cheng, K.3
  • 32
    • 34547655973 scopus 로고    scopus 로고
    • Compiler-managed software-based redundant multi-threading for transient fault detection
    • Cheng Wang, Ho-Seop Kim, Youfeng Wu, and Victor Ying. Compiler-managed software-based redundant multi-threading for transient fault detection. In CGO, pages 244-258, 2007.
    • (2007) CGO , pp. 244-258
    • Wang, C.1    Kim, H.-S.2    Wu, Y.3    Ying, V.4
  • 33
    • 34547309741 scopus 로고    scopus 로고
    • Dynamic slicing long running programs through execution fast forwarding
    • Xiangyu Zhang, Sriraman Tallam, and Rajiv Gupta. Dynamic slicing long running programs through execution fast forwarding. In SIGSOFT '06/FSE-14, pages 81-91, 2006.
    • (2006) SIGSOFT '06/FSE-14 , pp. 81-91
    • Zhang, X.1    Tallam, S.2    Gupta, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.