Intrusion recovery for database-backed web applications

R Chandra, T Kim, M Shah, N Narula… - Proceedings of the …, 2011 - dl.acm.org
Warp is a system that helps users and administrators of web applications recover from
intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while …

Performance troubleshooting in data centers: an annotated bibliography?

C Wang, SP Kavulya, J Tan, L Hu, M Kutare… - ACM SIGOPS …, 2013 - dl.acm.org
In the emerging cloud computing era, enterprise data centers host a plethora of web
services and applications, including those for e-Commerce, distributed multimedia, and …

MIRES: Intrusion recovery for applications based on backend-as-a-service

D Vaz, DR Matos, ML Pardal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Backend-as-a-Service (BaaS) cloud computing model supports many modern popular
mobile applications because it simplifies the development and management of services …

Security evaluation of wordpress backup plugins

I Cernica, N Popescu - 2019 22nd International Conference …, 2019 - ieeexplore.ieee.org
Protecting the web applications is an important task for every organization. Wordpress is the
most preferred content management system by organizations. In this paper we discuss why …

Asynchronous intrusion recovery for interconnected web services

R Chandra, T Kim, N Zeldovich - Proceedings of the Twenty-Fourth ACM …, 2013 - dl.acm.org
Recovering from attacks in an interconnected system is difficult, because an adversary that
gains access to one part of the system may propagate to many others, and tracking down …

Sanare: Pluggable intrusion recovery for web applications

DR Matos, ML Pardal, M Correia - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Web applications are exposed to many threats and, despite the best defensive efforts, are
often successfully attacked. Reverting the effects of an attack on the state of such an …

FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection

K Bhat, E Van Der Kouwe, H Bos… - 2021 51st Annual IEEE …, 2021 - ieeexplore.ieee.org
Despite advances in software testing, many bugs still plague deployed software, leading to
crashes and thus service disruption in high-availability production applications. Existing …

μVerum: Intrusion Recovery for Microservice Applications

DR Matos, ML Pardal, AR Silva, M Correia - IEEE Access, 2023 - ieeexplore.ieee.org
Microservice architectures allow complex applications to be developed as a collection of
loosely coupled components. The heterogeneous architecture of these applications makes …

Rectify: Black-box intrusion recovery in paas clouds

DR Matos, ML Pardal, M Correia - Proceedings of the 18th ACM/IFIP …, 2017 - dl.acm.org
Web applications hosted on the cloud are exposed to cyberattacks and can be compromised
by HTTP requests that exploit vulnerabilities. Platform as a Service (PaaS) offerings often …

Recoverable token: Recovering from intrusions against digital assets in Ethereum

FF Martins, DR Matos, ML Pardal… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Blockchain systems allow storing digital assets in a tamper-proof, consensus-based, append-
only ledger in a decentralized fashion, where no single party has full control. A blockchain is …