-
1
-
-
33846320847
-
Networking aspects in the dpasa survivability architecture: An experience report
-
IEEE Computer Society
-
Atighetchi, M., Rubel, P., Pal, P.P., Chong, J., Sudin, L.: Networking aspects in the dpasa survivability architecture: An experience report. In: Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), pp. 219-222. IEEE Computer Society (2005)
-
(2005)
Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005)
, pp. 219-222
-
-
Atighetchi, M.1
Rubel, P.2
Pal, P.P.3
Chong, J.4
Sudin, L.5
-
2
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.E.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Sec. Comput. 1(1), 11-33 (2004)
-
(2004)
IEEE Trans. Dependable Sec. Comput.
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.C.2
Randell, B.3
Landwehr, C.E.4
-
3
-
-
80051486714
-
Diversity as a defense strategy in information systems. Does evidence from previous events support such an approach?
-
Gertz, M., Guldentops, E., Strous, L. (eds.) Kluwer
-
Bain, C., Faatz, D.B., Fayad, A., Williams, D.E.: Diversity as a defense strategy in information systems. does evidence from previous events support such an approach? In: Gertz, M., Guldentops, E., Strous, L. (eds.) Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, IICIS 2001. IFIP Conference Proceedings, vol. 211, pp. 77-94. Kluwer (2001)
-
(2001)
Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, IICIS 2001. IFIP Conference Proceedings
, vol.211
, pp. 77-94
-
-
Bain, C.1
Faatz, D.B.2
Fayad, A.3
Williams, D.E.4
-
4
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Jajodia, S., Atluri, V., Jaeger, T. (eds.) ACM
-
Barrantes, E.G., Ackley, D.H., Palmer, T.S., Stefanovic, D., Zovi, D.D.: Randomized instruction set emulation to disrupt binary code injection attacks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 281-289. ACM (2003)
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Stefanovic, D.4
Zovi, D.D.5
-
5
-
-
84855361984
-
Forever: Fault/intrusion removal through evolution & recovery
-
Douglis, F. (ed.) ACM
-
Bessani, A.N., Reiser, H.P., Sousa, P., Gashi, I., Stankovic, V., Distler, T., Kapitza, R., Daidone, A., Obelheiro, R.R.: Forever: Fault/intrusion removal through evolution & recovery. In: Douglis, F. (ed.) ACM/IFIP/USENIX 9th International Middleware Conference, pp. 99-101. ACM (2008)
-
(2008)
ACM/IFIP/USENIX 9th International Middleware Conference
, pp. 99-101
-
-
Bessani, A.N.1
Reiser, H.P.2
Sousa, P.3
Gashi, I.4
Stankovic, V.5
Distler, T.6
Kapitza, R.7
Daidone, A.8
Obelheiro, R.R.9
-
6
-
-
49949115783
-
Data Space Randomization
-
Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
-
Bhatkar, S., Sekar, R.: Data Space Randomization. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 1-22. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 1-22
-
-
Bhatkar, S.1
Sekar, R.2
-
7
-
-
33846266623
-
Survivability architecture of a mission critical system: The dpasa example
-
IEEE Computer Society
-
Chong, J., Pal, P.P., Atighetchi, M., Rubel, P., Webber, F.: Survivability architecture of a mission critical system: The dpasa example. In: 21st Annual Computer Security Applications Conference, ACSAC 2005, pp. 495-504. IEEE Computer Society (2005)
-
(2005)
21st Annual Computer Security Applications Conference, ACSAC 2005
, pp. 495-504
-
-
Chong, J.1
Pal, P.P.2
Atighetchi, M.3
Rubel, P.4
Webber, F.5
-
8
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
USENIX Association, Berkeley
-
Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems: a secretless framework for security through diversity. In: USENIX-SS 2006: Proceedings of the 15th conference on USENIX Security Symposium. USENIX Association, Berkeley (2006)
-
(2006)
USENIX-SS 2006: Proceedings of the 15th Conference on USENIX Security Symposium
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
9
-
-
81055157683
-
Diversity against accidental and deliberate faults
-
Ammann, P., Barnes, B.H., Jajodia, S., Sibley, E.H. (eds.) November 1998, IEEE Computer Press, Williamsburg
-
Deswarte, Y., Kanoun, K., Laprie, J.C.: Diversity against accidental and deliberate faults. In: Ammann, P., Barnes, B.H., Jajodia, S., Sibley, E.H. (eds.) Computer Security, Dependability, and Assurance: From Needs to Solutions, November 1998, pp. 171-181. IEEE Computer Press, Williamsburg (1998)
-
(1998)
Computer Security, Dependability, and Assurance: From Needs to Solutions
, pp. 171-181
-
-
Deswarte, Y.1
Kanoun, K.2
Laprie, J.C.3
-
10
-
-
78751505422
-
Intrusion tolerance for internet applications
-
Jacquart, R. (ed.) Building the Information Society, Kluwer
-
Deswarte, Y., Powell, D.: Intrusion tolerance for internet applications. In: Jacquart, R. (ed.) Building the Information Society, IFIP 18th World Computer Congress, pp. 241-256. Kluwer (2004)
-
(2004)
IFIP 18th World Computer Congress
, pp. 241-256
-
-
Deswarte, Y.1
Powell, D.2
-
11
-
-
0030697765
-
Building diverse computer systems
-
Forrest, S., Somayaji, A., Ackley, D.H.: Building diverse computer systems. In: Workshop on Hot Topics in Operating Systems, pp. 67-72 (1997)
-
(1997)
Workshop on Hot Topics in Operating Systems
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.H.3
-
12
-
-
33750379862
-
Behavioral distance measurement using Hidden Markov Models
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
Gao, D., Reiter, M.K., Song, D.X.: Behavioral Distance Measurement Using Hidden Markov Models. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 19-40. Springer, Heidelberg (2006) (Pubitemid 44617845)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219 LNCS
, pp. 19-40
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
13
-
-
33745665056
-
Behavioral Distance for Intrusion Detection
-
Valdes, A., Zamboni, D. (eds.) RAID 2005. Springer, Heidelberg
-
Gao, D., Reiter, M.K., Song, D.X.: Behavioral Distance for Intrusion Detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 63-81. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3858
, pp. 63-81
-
-
Gao, D.1
Reiter, M.K.2
Song, D.X.3
-
14
-
-
84855413994
-
-
Technical Memorandum TM-2010-287, Defence Reasearch and Development Canada - DRDC Valcartier
-
Gherbi, A., Charpentier, R., Couture, M.: Redundancy with diversity based software architectures for the detection and tolerance of cyber-attacks. Technical Memorandum TM-2010-287, Defence Reasearch and Development Canada - DRDC Valcartier (2010)
-
(2010)
Redundancy with Diversity Based Software Architectures for the Detection and Tolerance of Cyber-attacks
-
-
Gherbi, A.1
Charpentier, R.2
Couture, M.3
-
16
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
Jajodia, S., Atluri, V., Jaeger, T. (eds.) ACM
-
Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 272-280. ACM (2003)
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
17
-
-
60049085303
-
It monoculture security risks and defenses
-
Lala, J.H., Schneider, F.B.: It monoculture security risks and defenses. IEEE Security & Privacy 7(1), 12-13 (2009)
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.1
, pp. 12-13
-
-
Lala, J.H.1
Schneider, F.B.2
-
18
-
-
33748973730
-
An architecture for adaptive intrusion-tolerant applications
-
Pal, P.P., Rubel, P., Atighetchi, M., Webber, F., Sanders, W.H., Seri, M., Ramasamy, H.V., Lyons, J., Courtney, T., Agbaria, A., Cukier, M., Gossett, J.M., Keidar, I.: An architecture for adaptive intrusion-tolerant applications. Softw., Pract. Exper. 36(11-12), 1331-1354 (2006)
-
(2006)
Softw., Pract. Exper.
, vol.36
, Issue.11-12
, pp. 1331-1354
-
-
Pal, P.P.1
Rubel, P.2
Atighetchi, M.3
Webber, F.4
Sanders, W.H.5
Seri, M.6
Ramasamy, H.V.7
Lyons, J.8
Courtney, T.9
Agbaria, A.10
Cukier, M.11
Gossett, J.M.12
Keidar, I.13
-
19
-
-
0036931592
-
The design and implementation of an intrusion tolerant system
-
IEEE Computer Society
-
Reynolds, J.C., Just, J.E., Lawson, E., Clough, L.A., Maglich, R., Levitt, K.N.: The design and implementation of an intrusion tolerant system. In: International Conference on Dependable Systems and Networks (DSN 2002), pp. 285-292. IEEE Computer Society (2002)
-
(2002)
International Conference on Dependable Systems and Networks (DSN 2002)
, pp. 285-292
-
-
Reynolds, J.C.1
Just, J.E.2
Lawson, E.3
Clough, L.A.4
Maglich, R.5
Levitt, K.N.6
-
20
-
-
0036929535
-
Developing a heterogeneous intrusion tolerant corba system
-
IEEE Computer Society, Washington, DC, USA
-
Sames, D., Matt, B., Niebuhr, B., Tally, G., Whitmore, B., Bakken, D.E.: Developing a heterogeneous intrusion tolerant corba system. In: DSN 2002: Proceedings of the 2002 International Conference on Dependable Systems and Networks, pp. 239-248. IEEE Computer Society, Washington, DC, USA (2002)
-
(2002)
DSN 2002: Proceedings of the 2002 International Conference on Dependable Systems and Networks
, pp. 239-248
-
-
Sames, D.1
Matt, B.2
Niebuhr, B.3
Tally, G.4
Whitmore, B.5
Bakken, D.E.6
-
21
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Atluri, V., Pfitzmann, B., Mc- Daniel, P.D. (eds.) ACM
-
Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: Atluri, V., Pfitzmann, B., Mc- Daniel, P.D. (eds.) Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 298-307. ACM (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.J.4
Modadugu, N.5
Boneh, D.6
-
24
-
-
84855376395
-
-
Lloyd's Emerging Risk Team: Tech. Rep. Lloyd's April
-
Lloyd's Emerging Risk Team: Digital risks: Views of a changing risk landscape. Tech. Rep. Volume XIV, Lloyd's (April 2009)
-
(2009)
Digital Risks: Views of a Changing Risk Landscape
, vol.14
-
-
-
25
-
-
33745650701
-
COTS Diversity Based Intrusion Detection and Application to Web Servers
-
Valdes, A., Zamboni, D. (eds.) RAID 2005. Springer, Heidelberg
-
Totel, E., Majorczyk, F., Mé, L.: COTS Diversity Based Intrusion Detection and Application to Web Servers. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 43-62. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3858
, pp. 43-62
-
-
Totel, E.1
Majorczyk, F.2
Mé, L.3
-
26
-
-
84855385416
-
Dependable intrusion tolerance: Technology demo
-
IEEE Computer Society
-
Valdes, A., Almgren, M., Cheung, S., Deswarte, Y., Dutertre, B., Levy, J., Saïdi, H., Stavridou, V., Uribe, T.E.: Dependable intrusion tolerance: Technology demo. In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), pp. 128-130. IEEE Computer Society (2003)
-
(2003)
3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003)
, pp. 128-130
-
-
Valdes, A.1
Almgren, M.2
Cheung, S.3
Deswarte, Y.4
Dutertre, B.5
Levy, J.6
Saïdi, H.7
Stavridou, V.8
Uribe, T.E.9
-
27
-
-
33747276448
-
Intrusion-tolerant middleware: The road to automatic security
-
Veríssimo, P., Neves, N.F., Cachin, C., Poritz, J.A., Powell, D., Deswarte, Y., Stroud, R.J., Welch, I.: Intrusion-tolerant middleware: the road to automatic security. IEEE Security & Privacy 4(4), 54-62 (2006)
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.4
, pp. 54-62
-
-
Veríssimo, P.1
Neves, N.F.2
Cachin, C.3
Poritz, J.A.4
Powell, D.5
Deswarte, Y.6
Stroud, R.J.7
Welch, I.8
-
28
-
-
84946228500
-
A scalable intrusion-tolerant architecture for distributed services
-
Sitar: IEEE Computer Society, Los Alamitos
-
Wang, F., Jou, F., Gong, F., Sargor, C., Goseva-Popstojanova, K., Trivedi, K.: Sitar: A scalable intrusion-tolerant architecture for distributed services. In: Foundations of Intrusion Tolerant Systems. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
Foundations of Intrusion Tolerant Systems
-
-
Wang, F.1
Jou, F.2
Gong, F.3
Sargor, C.4
Goseva-Popstojanova, K.5
Trivedi, K.6
-
29
-
-
85019673131
-
A Model of Secretless Security in N-Variant Systems
-
Weatherwax, E., Knight, J., Nguyen-Tuong, A.: A Model of Secretless Security in N-Variant Systems. In: Workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS), In the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Network, DSN 2009 (2009)
-
(2009)
Workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS), in the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Network, DSN 2009
-
-
Weatherwax, E.1
Knight, J.2
Nguyen-Tuong, A.3
|