Show simple item record

dc.contributor.authorWang, Xi
dc.contributor.authorZeldovich, Nickolai
dc.contributor.authorKaashoek, M. Frans
dc.date.accessioned2012-08-15T18:29:20Z
dc.date.available2012-08-15T18:29:20Z
dc.date.issued2011-01
dc.identifier.isbn978-1-4503-1179-3
dc.identifier.urihttp://hdl.handle.net/1721.1/72155
dc.description.abstractRetroactive auditing is a new approach for detecting past intrusions and vulnerability exploits based on security patches. It works by spawning two copies of the code that was patched, one with and one without the patch, and running both of them on the same inputs observed during the system's original execution. If the resulting outputs differ, an alarm is raised, since the input may have triggered the patched vulnerability. Unlike prior tools, retroactive auditing does not require developers to write predicates for each vulnerability.en_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency. Clean-slate design of Resilient, Adaptive, Secure Hosts (Contract number N66001-10-2-4089)en_US
dc.description.sponsorshipNational Natural Science Foundation (CNS-1053143)en_US
dc.language.isoen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/2103799.2103810en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceMIT web domainen_US
dc.titleRetroactive auditingen_US
dc.typeArticleen_US
dc.identifier.citationXi Wang, Nickolai Zeldovich, and M. Frans Kaashoek. 2011. Retroactive auditing. In Proceedings of the Second Asia-Pacific Workshop on Systems (APSys '11). ACM, New York, NY, USA, , Article 9 , 5 pages.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.approverKaashoek, M. Frans
dc.contributor.mitauthorWang, Xi
dc.contributor.mitauthorZeldovich, Nickolai
dc.contributor.mitauthorKaashoek, M. Frans
dc.relation.journalProceedings of the Second Asia-Pacific Workshop on Systems (APSys '11)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsWang, Xi; Zeldovich, Nickolai; Kaashoek, M. Fransen
dc.identifier.orcidhttps://orcid.org/0000-0003-0238-2703
dc.identifier.orcidhttps://orcid.org/0000-0001-7098-586X
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record