Survivability of Operating Systems: Handling Vulnerabilities

نویسندگان

  • Neeraj Suri
  • Andréas Johansson
چکیده

Dependability and security are flip sides of the same coin – linked conceptually though differing in process! Both arise from the occurrence of design or operational “deficiencies” in a system though differ in the processes of invocation of these deficiencies. Security issues often pertain to the intentional abuse of these deficiencies (vulnerabilities) to perturb the system operations; dependability, on the other hand, leans more towards handling of the unexpected and unintentional exercising of such deficiencies (faults & errors) – the consequence of vulnerabilities from either the security or dependability viewpoint being that the delivery of expected services gets (potentially) disrupted. In this sense, the term “vulnerability” is equally applicable from both the dependability and security perspectives; we will use this term interchangeably representing fault/errors in the dependability context, and also its more common security usage. For the scope of this write-up, our “survivability” viewpoint focuses on enhancing the robustness of systems to provide for sustained delivery of proper services, be they dependability or security nuanced.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Insecure Context Switching: Inoculating Regular Expressions for Survivability

For most computer end–users, web browsers and Internet services act as the providers and protectors of their personal information, from bank accounts to personal correspondence. These systems are critical to users’ continued lifestyles but often show no evidence of survivability [43], or robustness against present and future attacks. Software defects, considered the largest risk to survivabilit...

متن کامل

Survivability-Over-Security: Providing Whole System Assurance

Whole system assurance is necessary since over-reliance on protection solutions for system components has actually contributed to the fragility of information systems when viewed as a whole. For instance, the use of authentication and encryption to protect networked systems may actually add more vulnerabilities to the system as a whole than they eliminate. The goal of this research is to increa...

متن کامل

Survivability From a Sow’s Ear: The Retrofit Security Requirement

This paper considers the survivability requirement for production operating systems that underlie typical information systems. Since economic incentives give competitive advantages to imperfect and therefore insecure software, it seems inevitable to consider retrofitting some form of security to existing systems. This approach has long been anathema in the security community. We outline the pra...

متن کامل

Cost Function Modelling for Semi-automated SC, RTG and Automated and Semi-automated RMG Container Yard Operating Systems

This study analyses the concept of cost functions for semi-automated Straddle Carrier (SC), Rubber Tyred Gantry (RTG) and automated Rail Mounted Gantry (RMG) container yard operating cranes. It develops a generic cost based model for a pair-wise comparison, analysis and evaluation of economic efficiency and effectiveness of container yard equipment to be used for decision-making by terminal pla...

متن کامل

Building Trustworthy Systems: Lessons from the PTN and Internet

large and complex networked information systems. Studying the vulnerabilities of these systems can help identify ways new research might eliminate those vulnerabilities. N ational and economic infrastructures are coming to depend on networked information systems, or NISs. These systems must be trustworthy—do what users and operators expect (and not something else) despite environmental disrupti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004