A Davis, T Leek, M Zhivich, K Gwinnup… - 2014 USENIX Summit …, 2014 - usenix.org
Capture the Flag (CTF) is well-established as a computer security contest of skill in which teams compete in real time for prizes and bragging rights. At the time of this writing, CTFtime …
EW Fulp, HD Gage, DJ John… - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
Many cyber attacks can be attributed to poorly configured software, where administrators are often unaware of insecure settings due to the configuration complexity or the novelty of an …
B Benyo, P Pal, R Schantz, A Paulos… - 2013 IEEE 7th …, 2013 - ieeexplore.ieee.org
This paper presents a recently achieved incremental milestone on the long path toward more intelligently adaptive, automated and self-managed computer systems. We …
MB Chhetri, H Luong, AV Uzunov… - 2018 25th …, 2018 - ieeexplore.ieee.org
Resilience is an important property of cyber defence systems operating in complex, adversarial environments. In previous work, we have developed the AWaRE approach for …
For modern software systems, performance analysis can be a challenging task. The software stack can be a complex, multi-layer, multi-component, concurrent, and parallel environment …
SS Clark, A Paulos, B Benyo, P Pal… - … Reliability and Security, 2015 - ieeexplore.ieee.org
A3 is an execution management environment that aims to make network-facing applications and services resilient against zero-day attacks. A3 recently underwent two adversarial …
A Paulos, P Pal, R Schantz, B Benyo… - 2013 International …, 2013 - ieeexplore.ieee.org
Reliable isolation of malicious application inputs is necessary for preventing the future success of an observed novel attack after the initial incident. In this paper we describe …
J Cleveland, J Loyall, J Hanna - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
Fault tolerance and survivability are important aspects of many business-critical and mission- critical systems but it is still difficult to assess how well fault tolerance techniques work …
F Palumbo, A Buji, A Yazidi… - 2022 14th IFIP Wireless …, 2022 - ieeexplore.ieee.org
Proper configuration of operating systems and program parameters is known to be a key security factor in order to remove vulnerabilities. It is known that vulnerabilities can be …