Abstract | ||
---|---|---|
This paper describes an ongoing research effort aiming to use adaptation to defend individual applications against novel attacks. Application focused adaptive security spans adaptive use of security mechanisms in both the host and the network. The work presented in this paper is developing key infrastructure capabilities and supporting services including mandatory mediation of application I/O, record and replay of channel interaction, and VMI-based monitoring and analysis of execution that will facilitate replay-based diagnosis and patch derivation for attacks that succeed and go unnoticed until a known undesired condition manifests. After describing the basics, we present the results from our initial evaluation and outline the next steps. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/SASOW.2012.13 | SASO Workshops |
Keywords | Field | DocType |
individual application,attack immunization,adaptive defense,channel interaction,resilience,vmi-based monitoring,mandatory mediation,novel attacks,fault tolerant computing,virtual machines,attack self-adaptive diagnosis,adaptive security span,self-adaptive diagnosis,security mechanism,next step,survivable application,adaptive use,adaptive security mechanism,application input-output,key infrastructure capability,replay-based diagnosis,initial evaluation,security of data | Psychological resilience,Adaptive security,Virtual machine,Computer science,Computer security,Communication channel,Real-time computing,Self adaptive,Distributed computing | Conference |
ISSN | ISBN | Citations |
1949-3673 | 978-1-4673-5153-9 | 6 |
PageRank | References | Authors |
1.02 | 5 | 7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Partha Pal | 1 | 210 | 24.84 |
Richard Schantz | 2 | 98 | 8.90 |
Aaron Paulos | 3 | 29 | 4.43 |
Brett Benyo | 4 | 253 | 35.08 |
David Johnson | 5 | 24 | 3.51 |
Mike Hibler | 6 | 414 | 62.01 |
Eric Eide | 7 | 603 | 37.01 |