메뉴 건너뛰기




Volumn , Issue , 2009, Pages 87-102

Automatically patching errors in deployed software

Author keywords

Self healing

Indexed keywords

AUTOMATICALLY GENERATED; CODE INJECTION; CORRECT ERROR; DEBUGGING INFORMATION; DEPLOYED SOFTWARE; ERROR DETECTORS; FLOW OF CONTROL; HIGH AVAILABILITY; HUMAN INTERVENTION; NORMAL BEHAVIOR; RUNNING APPLICATIONS; SECURITY VULNERABILITIES; SELF-HEALING; SOURCE CODES;

EID: 72249104274     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1629575.1629585     Document Type: Conference Paper
Times cited : (332)

References (49)
  • 2
    • 37148999612 scopus 로고    scopus 로고
    • Efficient detection of all pointer and array access errors
    • June
    • AUSTIN, T., BREACH, S., AND SOHI, G. Efficient detection of all pointer and array access errors. In PLDI (June 2004).
    • (2004) PLDI
    • AUSTIN, T.1    BREACH, S.2    SOHI, G.3
  • 3
    • 60649106745 scopus 로고    scopus 로고
    • Automatic inference and enforcement of kernel data structure invariants
    • Dec
    • BALIGA, A., GANAPATHY, V., AND IFTODE, L. Automatic inference and enforcement of kernel data structure invariants. In ACSAC (Dec. 2008), pp. 77-86.
    • (2008) ACSAC , pp. 77-86
    • BALIGA, A.1    GANAPATHY, V.2    IFTODE, L.3
  • 4
    • 33746101822 scopus 로고    scopus 로고
    • DieHard: Probabilistic memory safety for unsafe languages
    • June
    • BERGER, E., AND ZORN, B. DieHard: probabilistic memory safety for unsafe languages. In PLDI (June 2006).
    • (2006) PLDI
    • BERGER, E.1    ZORN, B.2
  • 6
    • 0035703918 scopus 로고    scopus 로고
    • Recursive restartability: Turning the reboot sledgehammer into a scalpel
    • Schloss Elmau, Germany, May
    • CANDEA, G., AND FOX, A. Recursive restartability: Turning the reboot sledgehammer into a scalpel. In HotOS (Schloss Elmau, Germany, May 2001).
    • (2001) HotOS
    • CANDEA, G.1    FOX, A.2
  • 8
    • 70450092967 scopus 로고    scopus 로고
    • COSTA, M., CASTRO, M., ANTONY, ZHOU, L., ZHANG, L., AND PEINADO, M. Bouncer: securing software by blocking bad input. In SOSP (Oct. 2007).
    • COSTA, M., CASTRO, M., ANTONY, ZHOU, L., ZHANG, L., AND PEINADO, M. Bouncer: securing software by blocking bad input. In SOSP (Oct. 2007).
  • 11
    • 21644482450 scopus 로고    scopus 로고
    • Minos: Control data attack prevention orthogonal to memory model
    • Dec
    • CRANDALL, J., AND CHONG, F. Minos: Control data attack prevention orthogonal to memory model. In MICRO (Dec. 2004).
    • (2004) MICRO
    • CRANDALL, J.1    CHONG, F.2
  • 12
    • 72249114227 scopus 로고    scopus 로고
    • ShieldGen: Automatic data patch generation for unknown vulnerabilities with informed probing
    • May
    • CUI, W., PEINADO, M., WANG, H. J., AND LOCASTO, M. E. ShieldGen: Automatic data patch generation for unknown vulnerabilities with informed probing. In IEEE S&P (May 2007).
    • (2007) IEEE S&P
    • CUI, W.1    PEINADO, M.2    WANG, H.J.3    LOCASTO, M.E.4
  • 13
    • 34247373512 scopus 로고    scopus 로고
    • DEMSKY, B., ERNST, M. D., GUO, P. J., MCCAMANT, S., PERKINS, J. H., AND RINARD, M. Inference and enforcement of data structure consistency specifications. In ISSTA (July 2006).
    • DEMSKY, B., ERNST, M. D., GUO, P. J., MCCAMANT, S., PERKINS, J. H., AND RINARD, M. Inference and enforcement of data structure consistency specifications. In ISSTA (July 2006).
  • 15
    • 33244493764 scopus 로고    scopus 로고
    • Data structure repair using goal-directed reasoning
    • May
    • DEMSKY, B., AND RINARD, M. Data structure repair using goal-directed reasoning. In ICSE (May 2005).
    • (2005) ICSE
    • DEMSKY, B.1    RINARD, M.2
  • 16
    • 0038256425 scopus 로고    scopus 로고
    • Dynamically discovering likely program invariants to support program evolution
    • Feb
    • ERNST, M. D., COCKRELL, J., GRISWOLD, W. G., AND NOTKIN, D. Dynamically discovering likely program invariants to support program evolution. IEEE TSE 27, 2 (Feb. 2001).
    • (2001) IEEE TSE , vol.27 , pp. 2
    • ERNST, M.D.1    COCKRELL, J.2    GRISWOLD, W.G.3    NOTKIN, D.4
  • 18
    • 72749113538 scopus 로고    scopus 로고
    • A genetic programming approach to automated software repair
    • July
    • FORREST, S., WEIMER, W., NGUYEN, T., AND GOUES, C. L. A genetic programming approach to automated software repair. In GECCO (July 2009).
    • (2009) GECCO
    • FORREST, S.1    WEIMER, W.2    NGUYEN, T.3    GOUES, C.L.4
  • 20
    • 85084164164 scopus 로고    scopus 로고
    • JIM, T., MORRISETT, G., GROSSMAN, D., HICKS, M., CHENEY, J., AND WANG, Y. Cyclone: A safe dialect of C. In USENIX (June 2002).
    • JIM, T., MORRISETT, G., GROSSMAN, D., HICKS, M., CHENEY, J., AND WANG, Y. Cyclone: A safe dialect of C. In USENIX (June 2002).
  • 21
    • 0012582509 scopus 로고    scopus 로고
    • Backwards-compatible bounds checking for arrays and pointers in C programs
    • May
    • JONES, R., AND KELLY, P. Backwards-compatible bounds checking for arrays and pointers in C programs. In AADEBUG (May 1997).
    • (1997) AADEBUG
    • JONES, R.1    KELLY, P.2
  • 22
    • 85076901048 scopus 로고    scopus 로고
    • Deadlock immunity: Enabling systems to defend against deadlocks
    • Dec
    • JULA, H., TRALAMAZZA, D., ZAMFIR, C., AND CANDEA, G. Deadlock immunity: Enabling systems to defend against deadlocks. In OSDI (Dec. 2008), pp. 295-308.
    • (2008) OSDI , pp. 295-308
    • JULA, H.1    TRALAMAZZA, D.2    ZAMFIR, C.3    CANDEA, G.4
  • 23
    • 17644371841 scopus 로고
    • Run-time checking for C programs
    • KENDALL, S. C. Bcc: Run-time checking for C programs. In USENIX Summer (1983).
    • (1983) USENIX Summer
    • KENDALL, S.C.B.1
  • 25
    • 34247092939 scopus 로고    scopus 로고
    • Improving adaptability via program steering
    • July
    • LIN, L., AND ERNST, M. D. Improving adaptability via program steering. In ISSTA (July 2004).
    • (2004) ISSTA
    • LIN, L.1    ERNST, M.D.2
  • 27
    • 33750285193 scopus 로고    scopus 로고
    • Software self-healing using collaborative application communities
    • Feb
    • LOCASTO, M. E., SIDIROGLOU, S., AND KEROMYTIS, A. D. Software self-healing using collaborative application communities. In SNDSS (Feb. 2005).
    • (2005) SNDSS
    • LOCASTO, M.E.1    SIDIROGLOU, S.2    KEROMYTIS, A.D.3
  • 28
    • 47349109259 scopus 로고    scopus 로고
    • Towards self-protecting enterprise applications
    • Nov
    • LORENZOLI, D., MARIANI, L., AND PEZZÈ, M. Towards self-protecting enterprise applications. In ISSRE (Nov. 2007), pp. 39-48.
    • (2007) ISSRE , pp. 39-48
    • LORENZOLI, D.1    MARIANI, L.2    PEZZÈ, M.3
  • 29
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Feb
    • NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS (Feb. 2005).
    • (2005) NDSS
    • NEWSOME, J.1    SONG, D.2
  • 30
    • 59449083597 scopus 로고    scopus 로고
    • Exterminator: Automatically correcting memory errors with high probability
    • Dec
    • NOVARK, G., BERGER, E., AND ZORN, B. Exterminator: Automatically correcting memory errors with high probability. Communications of the ACM 51, 12 (Dec. 2008).
    • (2008) Communications of the ACM , vol.51 , pp. 12
    • NOVARK, G.1    BERGER, E.2    ZORN, B.3
  • 31
    • 20344367789 scopus 로고    scopus 로고
    • PERKINS, J. H., AND ERNST, M. D. Efficient incremental algorithms for dynamic detection of likely invariants. In FSE (Nov. 2004).
    • PERKINS, J. H., AND ERNST, M. D. Efficient incremental algorithms for dynamic detection of likely invariants. In FSE (Nov. 2004).
  • 32
    • 33845429905 scopus 로고    scopus 로고
    • QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: treating bugs as allergies-a safe method to survive software failures. SIGOPS Oper. Syst. Rev. 39, 5 (2005), 235-248.
    • QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: treating bugs as allergies-a safe method to survive software failures. SIGOPS Oper. Syst. Rev. 39, 5 (2005), 235-248.
  • 33
    • 67249139196 scopus 로고    scopus 로고
    • Acceptability-oriented computing
    • Oct
    • RINARD, M. Acceptability-oriented computing. In OOPSLA Companion (Oct. 2003).
    • (2003) OOPSLA Companion
    • RINARD, M.1
  • 34
    • 21644473822 scopus 로고    scopus 로고
    • RINARD, M., CADAR, C., DUMITRAN, D., ROY, D. M., AND LEU, T. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In ACSAC (Dec. 2004).
    • RINARD, M., CADAR, C., DUMITRAN, D., ROY, D. M., AND LEU, T. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In ACSAC (Dec. 2004).
  • 35
    • 84906487819 scopus 로고    scopus 로고
    • Enhancing server availability and security through failure-oblivious computing
    • December
    • RINARD, M., CADAR, C., DUMITRAN, D., ROY, D. M., LEU, T., AND WILLIAMS. BEEBEE, J. Enhancing server availability and security through failure-oblivious computing. In OSDI (December 2004).
    • (2004) OSDI
    • RINARD, M.1    CADAR, C.2    DUMITRAN, D.3    ROY, D.M.4    LEU, T.5    WILLIAMS6    BEEBEE, J.7
  • 37
    • 77954504457 scopus 로고    scopus 로고
    • A practical dynamic buffer overflow detector
    • February
    • RUWASE, O., AND LAM, M. S. A practical dynamic buffer overflow detector. In NDSS (February 2004).
    • (2004) NDSS
    • RUWASE, O.1    LAM, M.S.2
  • 39
    • 84888577735 scopus 로고    scopus 로고
    • SIDIROGLOU, S., GIOVANIDIS, G., AND KEROMYTIS, A. D. A dynamic mechanism for recovering from buffer overflow attacks. In ISC (Sep. 2005).
    • SIDIROGLOU, S., GIOVANIDIS, G., AND KEROMYTIS, A. D. A dynamic mechanism for recovering from buffer overflow attacks. In ISC (Sep. 2005).
  • 42
    • 84906497159 scopus 로고    scopus 로고
    • SIDIROGLOU, S., LOCASTO, M. E., BOYD, S. W., AND KEROMYTIS, A. D. Building a reactive immune system for software services. In USENIX (Apr. 2005).
    • SIDIROGLOU, S., LOCASTO, M. E., BOYD, S. W., AND KEROMYTIS, A. D. Building a reactive immune system for software services. In USENIX (Apr. 2005).
  • 43
    • 84888523496 scopus 로고    scopus 로고
    • SMIRNOV, A., AND CHIUEH, T. DIRA: Automatic detection, identification and repair of control-hijacking attacks. In NDSS (Feb. 2005).
    • SMIRNOV, A., AND CHIUEH, T. DIRA: Automatic detection, identification and repair of control-hijacking attacks. In NDSS (Feb. 2005).
  • 45
    • 84888486900 scopus 로고    scopus 로고
    • Stackshield. www.angelfire.com/sk/stackshield.
    • Stackshield
  • 46
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • Oct
    • SUH, G., LEE, J., ZHANG, D., AND DEVADAS, S. Secure program execution via dynamic information flow tracking. In ASPLOS (Oct. 2004).
    • (2004) ASPLOS
    • SUH, G.1    LEE, J.2    ZHANG, D.3    DEVADAS, S.4
  • 47
    • 84888546564 scopus 로고    scopus 로고
    • Symantech Internet security threat report, Sep. 2006
    • Symantech Internet security threat report. www.symantec.com, Sep. 2006.
  • 49
    • 1542376931 scopus 로고    scopus 로고
    • Protecting C programs from attacks via invalid pointer dereferences
    • YONG, S. H., AND HORWITZ, S. Protecting C programs from attacks via invalid pointer dereferences. In ESEC/FSE (2003).
    • (2003) ESEC/FSE
    • YONG, S.H.1    HORWITZ, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.