1999
DOI: 10.1145/306549.306563
|View full text |Cite
|
Sign up to set email alerts
|

Inoculating software for survivability

Abstract: An old adage holds true for software: you can build a stronger system by first breaking it • ANUP K. GHOSH AND JEFFREY M. VOAS ^^ ^'^^^Y ^998, several dozen computer systems in U.S. military installations and government facilities were successfully hacked, resulting in a fullscale Defense Department response now known as Operation Solar Sunrise. The attacks successfully broke into systems belonging to the Navy and Air Force as well as to federally funded research laboratories including Oak Ridge National Labor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2002
2002
2006
2006

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…In [Ghosh and Voas, 1999, pages 38-44), the problem of software reliability with regards to commercial off-the-shell (CarS) software is examined and a method of software inoculation is presented. Using such an inoculation technique, a filtering layer is put in place that protects the operating system's system calls from invocations with invalid parameters.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [Ghosh and Voas, 1999, pages 38-44), the problem of software reliability with regards to commercial off-the-shell (CarS) software is examined and a method of software inoculation is presented. Using such an inoculation technique, a filtering layer is put in place that protects the operating system's system calls from invocations with invalid parameters.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, methods of inoculation such as those presented in [Ghosh and Voas, 1999] could provide a level of security by filtering malicious event messages. Although this degrades performance, it is a solution to COTS software.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Using simple, public tools such as the web browser they could quietly penetrate organizations and commit crimes such as theft of sensitive data (credit card information, etc.) with a very low risk of getting caught (Ghosh and Voas 1999).…”
Section: Security Is the System Engineer's Businessmentioning
confidence: 99%
“…Ghosh, et al [31] propose "fault injection analysis" applied to software, while Strunk, et al [70] apply a lowlevel approach: they propose an intrusion detection and recovery model at the storage layer. Kreidl, et al [43] propose a formalized feedback-driven model for individual COTS applications.…”
Section: Related Workmentioning
confidence: 99%