Isolation of malicious external inputs in a security focused adaptive execution environment

Update item information
Publication Type pre-print
School or College College of Engineering
Department Computing, School of
Creator Hibler, Michael J.
Other Author Paulos, Aaron.; Pal, Partha; Schantz, Richard; Benyo, Brett; Johnson, David; Eide, Eric
Title Isolation of malicious external inputs in a security focused adaptive execution environment
Date 2013-01-01
Description Reliable isolation of malicious application inputs is necessary for preventing the future success of an observed novel attack after the initial incident. In this paper we describe, measure and analyze, Input-Reduction, a technique that can quickly isolate malicious external inputs that embody unforeseen and potentially novel attacks, from other benign application inputs. The Input-Reduction technique is integrated into an advanced, security-focused, and adaptive execution environment that automates diagnosis and repair. In experiments we show that Input-Reduction is highly accurate and efficient in isolating attack inputs and determining casual relations between inputs. We also measure and show that the cost incurred by key services that support reliable reproduction and fast attack isolation is reasonable in the adaptive execution environment.
Type Text
Publisher Institute of Electrical and Electronics Engineers (IEEE)
Issue 82
First Page 91
Language eng
Bibliographic Citation Paulos, A., Pal, P., Schantz, R., Benyo, B., Johnson, D., Hibler, M., & Eide, E. (2013). Isolation of malicious external inputs in a security focused adaptive execution environment. Proceedings - 2013 International Conference on Availability, Reliability and Security, 82-91.
Rights Management (c) 2013 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Format Medium application/pdf
Format Extent 280,163 bytes
Identifier uspace,18439
ARK ark:/87278/s6cv7srk
Setname ir_uspace
Date Created 2014-03-11
Date Modified 2014-03-11
ID 711700
Reference URL https://collections.lib.utah.edu/ark:/87278/s6cv7srk
Back to Search Results