The 18th IEEE International Symposium on Software Reliability (ISSRE '07) 2007
DOI: 10.1109/issre.2007.21
|View full text |Cite
|
Sign up to set email alerts
|

Towards Self-Protecting Enterprise Applications

Abstract: Enterprise systems must guarantee high availability and reliability to provide 24/7 services without interruptions and failures. Mechanisms for handling exceptional cases and implementing fault tolerance techniques can reduce failure occurrences, and increase dependability. Most of such mechanisms address major problems that lead to unexpected service termination or crashes, but do not deal with many subtle domain dependent failures that do not necessarily cause service termination or crashes, but result in in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
2
2

Relationship

3
6

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…FFTV (From Failures to Vaccine) [28] infers invariants that model normal behavior. At run time, violations of a programmer-written specification cause FFTV to record a "failure context", consisting of violated invariants and the stack backtrace.…”
Section: Invariant Inference and Immunitymentioning
confidence: 99%
“…FFTV (From Failures to Vaccine) [28] infers invariants that model normal behavior. At run time, violations of a programmer-written specification cause FFTV to record a "failure context", consisting of violated invariants and the stack backtrace.…”
Section: Invariant Inference and Immunitymentioning
confidence: 99%
“…Common techniques include check-pointing and rollback, roll-forward and reboot. Checkpointing and rollback mechanisms [Elnozahy et al 2002;Pradhan and Vaidya 1994] partially rollback the system to a consistent state, and retry the failed operation either as is or after some changes to increase the probability of success [Qin et al 2005;Lorenzoli et al 2007]. Roll-forward mechanisms react to failures by continuing the execution from the "closest" known consistent state in the future [Pradhan and Vaidya 1994].…”
Section: Error-recovery Strategiesmentioning
confidence: 99%
“…Although this resembles our technique, in the aspect of monitoring execution events, its dependence on examining application code and manually devising the signature pattern restrict its usability. Another comparable approach is given in [19], where attacks/failures are prevented by looking for failure-inducing execution contexts. Basically, conditions over program variables are identified and are expected to hold during application run-time.…”
Section: Related Workmentioning
confidence: 99%