Proceedings of the 2014 Symposium and Bootcamp on the Science of Security 2014
DOI: 10.1145/2600176.2600181
|View full text |Cite
|
Sign up to set email alerts
|

Architecture-based self-protection

Abstract: Security features are often hardwired into software applications, making it difficult to adapt security responses to reflect changes in runtime context and new attacks. In prior work, we proposed the idea of architecture-based self-protection as a way of separating adaptation logic from application logic and providing a global perspective for reasoning about security adaptations in the context of other business goals. In this paper, we present an approach, based on this idea, for combating denial-of-service (D… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…These attacks exploit information exposed in one state of the system to compromise a later state that can be reached during or after adaptation. Moreover, risk identification and analysis is often performed at design time [122,227]. Runtime security analysis is required to cope with systems that adapt often and exhibit dynamic behavior.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…These attacks exploit information exposed in one state of the system to compromise a later state that can be reached during or after adaptation. Moreover, risk identification and analysis is often performed at design time [122,227]. Runtime security analysis is required to cope with systems that adapt often and exhibit dynamic behavior.…”
Section: Discussionmentioning
confidence: 99%
“…P-III refers to enhancing security-aware adaptation with countermeasure selection. Countermeasure selection and deployment approaches have been proposed before, however, these approaches often are limited in either the kind of countermeasures that can be applied [94,204,227] or in the types of systems that they can protect. To the best of our knowledge, we lack a solution that follows a holistic approach taking into account the possible component and countermeasure configurations available to protect a software system, analyzes their effects, compatibility and costs, and identifies the best available configuration to be deployed.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations