The simple economics of cybercrimes, IEEE Security & Privacy, vol.4, issue.1, pp.33-39, 2006. ,
Shelf: Preserving business continuity and availability in an intrusion recovery system, Proceedings of the 25th Annual Computer Security Applications Conference, ser. ACSAC '09, pp.484-493, 2009. ,
The taser intrusion recovery system, Proceedings of the 20th ACM Symposium on Operating Systems Principles, ser. SOSP '05, pp.163-176, 2005. ,
Intrusion recovery using selective re-execution, Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI'10. USENIX Association, pp.89-104, 2010. ,
Back to the future: A framework for automatic malware removal and system repair, Proceedings of the 22nd Annual Computer Security Applications Conference, ser. ACSAC '06, pp.257-268, 2006. ,
Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode, Proceedings of the 33rd Annual Computer Security Applications Conference, ser. ACSAC '17, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01634566
From dependability to resilience, 38th IEEE/IFIP International Conference On Dependable Systems and Networks, 2008. ,
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
Survivable network systems: An emerging discipline, Tech. Rep, 1997. ,
Towards a rigorous definition of information system survivability, Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, vol.1, pp.78-89, 2003. ,
Malware Attribute Enumeration and Characterization, 2011. ,
Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX), 2014. ,
, CRIU, 2018.
the ultimate snapshot tool for linux, 2018. ,
, systemd system and service manager, 2018.
Seccomp and sandboxing, 2009. ,
Namespaces in operation, part 1: namespaces overview, LWN, 2013. ,