Self-improving autonomic systems for antifragile cyber defence: Challenges and opportunities

MB Chhetri, A Uzunov, B Vo, S Nepal… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Antifragile systems enhance their capabilities and become stronger when exposed to
adverse conditions, stresses or attacks, making antifragility a desirable property for cyber …

The fun and future of {CTF}

A Davis, T Leek, M Zhivich, K Gwinnup… - 2014 USENIX Summit …, 2014 - usenix.org
Capture the Flag (CTF) is well-established as a computer security contest of skill in which
teams compete in real time for prizes and bragging rights. At the time of this writing, CTFtime …

An evolutionary strategy for resilient cyber defense

EW Fulp, HD Gage, DJ John… - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
Many cyber attacks can be attributed to poorly configured software, where administrators are
often unaware of insecure settings due to the configuration complexity or the novelty of an …

Automated Self-Adaptation for Cyber-Defense--Pushing Adaptive Perimeter Protection Inward

B Benyo, P Pal, R Schantz, A Paulos… - 2013 IEEE 7th …, 2013 - ieeexplore.ieee.org
This paper presents a recently achieved incremental milestone on the long path toward
more intelligently adaptive, automated and self-managed computer systems. We …

ADSL: an embedded domain-specific language for constraint-based distributed self-management

MB Chhetri, H Luong, AV Uzunov… - 2018 25th …, 2018 - ieeexplore.ieee.org
Resilience is an important property of cyber defence systems operating in complex,
adversarial environments. In previous work, we have developed the AWaRE approach for …

Weir: A streaming language for performance analysis

A Burtsev, N Mishrikoti, E Eide, R Ricci - ACM SIGOPS Operating …, 2014 - dl.acm.org
For modern software systems, performance analysis can be a challenging task. The software
stack can be a complex, multi-layer, multi-component, concurrent, and parallel environment …

Empirical evaluation of the a3 environment: evaluating defenses against zero-day attacks

SS Clark, A Paulos, B Benyo, P Pal… - … Reliability and Security, 2015 - ieeexplore.ieee.org
A3 is an execution management environment that aims to make network-facing applications
and services resilient against zero-day attacks. A3 recently underwent two adversarial …

Isolation of malicious external inputs in a security focused adaptive execution environment

A Paulos, P Pal, R Schantz, B Benyo… - 2013 International …, 2013 - ieeexplore.ieee.org
Reliable isolation of malicious application inputs is necessary for preventing the future
success of an observed novel attack after the initial incident. In this paper we describe …

An aspect-oriented approach to assessing fault tolerance

J Cleveland, J Loyall, J Hanna - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
Fault tolerance and survivability are important aspects of many business-critical and mission-
critical systems but it is still difficult to assess how well fault tolerance techniques work …

Genetic Algorithms For Tightening Security

F Palumbo, A Buji, A Yazidi… - 2022 14th IFIP Wireless …, 2022 - ieeexplore.ieee.org
Proper configuration of operating systems and program parameters is known to be a key
security factor in order to remove vulnerabilities. It is known that vulnerabilities can be …