Analysis of Faults in an N-Version Software Experiment
IEEE Transactions on Software Engineering
ACM Transactions on Programming Languages and Systems (TOPLAS)
Using design patterns to develop reusable object-oriented communication software
Communications of the ACM - Special issue on object-oriented experiences and future trends
Software fault injection: inoculating programs against errors
Software fault injection: inoculating programs against errors
Efficient transparent application recovery in client-server information systems
SIGMOD '98 Proceedings of the 1998 ACM SIGMOD international conference on Management of data
Communications of the ACM
Survivability—a new technical and business perspective on security
Proceedings of the 1999 workshop on New security paradigms
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
Dependability certification of software components
Journal of Systems and Software - Special issue on Evaluation and assessment in software engineering
Fault Injection Techniques and Tools
Computer
Persistent Client-Server Database Sessions
EDBT '00 Proceedings of the 7th International Conference on Extending Database Technology: Advances in Database Technology
Persistent Applications Using Generalized Redo Recovery
ICDE '98 Proceedings of the Fourteenth International Conference on Data Engineering
Masking System Crashes in Database Application Programs
VLDB '87 Proceedings of the 13th International Conference on Very Large Data Bases
Pinpoint: Problem Determination in Large, Dynamic Internet Services
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
On the Emulation of Software Faults by Software Fault Injection
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Binding identities and attributes using digitally signed certificates
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Error Recovery in Critical Infrastructure Systems
CSDA '98 Proceedings of the Conference on Computer Security, Dependability, and Assurance: From Needs to Solutions
PISCES: A Tool for Predicting Software Testability
PISCES: A Tool for Predicting Software Testability
Static vs. Dynamic Recovery Models for Survivable Distributed Systems
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 2 - Volume 2
A Definition for Information System Survivability
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
Recovery guarantees for Internet applications
ACM Transactions on Internet Technology (TOIT)
A Framework to Control Emergent Survivability of Multi Agent Systems
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
Using instruction block signatures to counter code injection attacks
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
Self-managed decentralised systems using K-components and collaborative reinforcement learning
WOSS '04 Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems
Self-healing mechanisms for kernel system compromises
WOSS '04 Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems
An Experimental Evaluation on Reliability Features of N-Version Programming
ISSRE '05 Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering
Component Integrity Check and Recovery Against Malicious Codes
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Fine-Grained and Scalable Approaches for Message Integrity
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
An Optical Scan E-Voting System based on N-Version Programming
IEEE Security and Privacy
Covering code behavior on input validation in functional testing
Information and Software Technology
Predicting Effectiveness of Automatic Testing Tools
ASE '08 Proceedings of the 2008 23rd IEEE/ACM International Conference on Automated Software Engineering
A Novel Simulation Fault Injection Method for Dependability Analysis
IEEE Design & Test
An Object-Oriented Approach to Programming Logic and Design
An Object-Oriented Approach to Programming Logic and Design
Research about Software Fault Injection Technology Based on Distributed System
MVHI '10 Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface
Designing Test Coverage for Grey Box Analysis
QSIC '10 Proceedings of the 2010 10th International Conference on Quality Software
A software integration approach for designing and assessing dependable embedded systems
Journal of Systems and Software
Design and Implementation of an Intrusion-Tolerant Self-Healing Application Server
ICCIIS '10 Proceedings of the 2010 International Conference on Communications and Intelligence Information Security
Survivability strategies in multihop wireless networks
IEEE Wireless Communications
Hi-index | 0.00 |
As information systems develop into larger and more complex implementations, the need for survivability in mission-critical systems is pressing. Furthermore, the requirement for protecting information systems becomes increasingly vital, while new threats are identified each day. It becomes more challenging to build systems that will detect such threats and recover from the damage. This is particularly critical for distributed mission-critical systems, which cannot afford a letdown in functionality even though there are internal component failures or compromises with malicious codes, especially in a downloaded component from an external source. Therefore, when using such a component, we should check to see if the source of the component is trusted and that the code has not been modified in an unauthorized manner since it was created. Furthermore, once we find failures or malicious codes in the component, we should fix those problems and continue the original functionality of the component at runtime so that we can support survivability in the mission-critical system. In this paper, we define our definition of survivability, discuss the survivability challenges in component-sharing in a large distributed system, identify the static and dynamic survivability models, and discuss their trade-offs. Consequently, we propose novel approaches for component survivability. Finally, we prove the feasibility of our ideas by implementing component recovery against internal failures and malicious codes based on the dynamic model.