Rx: treating bugs as allergies---a safe method to survive software failures

F Qin, J Tucek, J Sundaresan, Y Zhou - Proceedings of the twentieth …, 2005 - dl.acm.org
Many applications demand availability. Unfortunately, software failures greatly reduce
system availability. Prior work on surviving software failures suffers from one or more of the …

Detecting stealth software with strider ghostbuster

YM Wang, D Beck, B Vo, R Roussev… - … and Networks (DSN' …, 2005 - ieeexplore.ieee.org
Stealth malware programs that silently infect enterprise and consumer machines are
becoming a major threat to the future of the Internet. Resource hiding is a powerful stealth …

Hyperspector: virtual distributed monitoring environments for secure intrusion detection

K Kourai, S Chiba - Proceedings of the 1st ACM/USENIX international …, 2005 - dl.acm.org
In this paper, a virtual distributed monitoring environment called HyperSpector is described
that achieves secure intrusion detection in distributed computer systems. While multiple …

Distributed job manager recovery

JR Challenger, LR Degenaro, JR Giles… - US Patent …, 2010 - Google Patents
(57) ABSTRACT A method is provided for the recovery of an instance of a job manager
running on one of a plurality of nodes used to execute the processing elements associated …

Otherworld: giving applications a chance to survive OS kernel crashes

A Depoutovitch, M Stumm - Proceedings of the 5th European conference …, 2010 - dl.acm.org
The default behavior of all commodity operating systems today is to restart the system when
a critical error is encountered in the kernel. This terminates all running applications with an …

[PDF][PDF] A taxonomy of compositional adaptation

PK McKinley, SM Sadjadi, EP Kasten… - … numéroMSU-CSE-04 …, 2004 - users.cs.fiu.edu
Driven by the emergence of pervasive computing and the increasing need for self-managed
systems, many approaches have been proposed for building software that can dynamically …

Regulating arm trustzone devices in restricted spaces

F Brasser, D Kim, C Liebchen, V Ganapathy… - Proceedings of the 14th …, 2016 - dl.acm.org
Smart personal devices equipped with a wide range of sensors and peripherals can
potentially be misused in various environments. They can be used to exfiltrate sensitive …

Rx: Treating bugs as allergies—a safe method to survive software failures

F Qin, J Tucek, Y Zhou, J Sundaresan - ACM Transactions on Computer …, 2007 - dl.acm.org
Many applications demand availability. Unfortunately, software failures greatly reduce
system availability. Prior work on surviving software failures suffers from one or more of the …

Reinforcement learning for autonomic network repair

ML Littman, N Ravi, E Fenson… - International Conference …, 2004 - ieeexplore.ieee.org
Reinforcement learning for autonomic network repair Page 1 Reinforcement Learning for
Autonomic Network Repair Michael L. Littman and Nishkam Ravi Department of Computer …

Xfas: Fault Recovery by Externally Controlling OS Behavior

K Kimura, K Kourai - Proceedings of the IEEE/ACM 16th International …, 2023 - dl.acm.org
It is difficult to completely avoid system failures in recent large-scale and complex clouds.
Therefore, it is important to detect system faults as symptoms of failures and then recover …