Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Softw 2020
DOI: 10.1145/3368089.3417056
|View full text |Cite
|
Sign up to set email alerts
|

Improving cybersecurity hygiene through JIT patching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…This is because the reboots following patch deployment are necessary for the applied patch to take effect. Further, the service interruptions caused by the reboots have been widely acknowledged as a major obstacle in patch management across several domains [1,13,27,43,51].…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…This is because the reboots following patch deployment are necessary for the applied patch to take effect. Further, the service interruptions caused by the reboots have been widely acknowledged as a major obstacle in patch management across several domains [1,13,27,43,51].…”
Section: Discussionmentioning
confidence: 99%
“…To understand why and how delays occur in practice, we conducted a longitudinal study with two organisations (Org A and B) involving 21 participants from 8 teams in Australia. 1 In selecting the case organisations, we used a combination of purposive [46] and convenience [30] sampling to ensure that our data are representative of the substantive area through which the findings emerge. The demographics of the studied teams are illustrated in Table 1.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…IBM researchers Araujo and Taylor [4] developed a just-in-time (JIT) patching framework called "Insider" for patching running legacy application processes. This was done by injecting and compiling the code inside the running processes while sandboxing malicious processes for threat investigations.…”
Section: Security Patchingmentioning
confidence: 99%