N. Kshetri, The simple economics of cybercrimes, IEEE Security & Privacy, vol.4, issue.1, pp.33-39, 2006.

X. Xiong, X. Jia, and P. Liu, Shelf: Preserving business continuity and availability in an intrusion recovery system, Proceedings of the 25th Annual Computer Security Applications Conference, ser. ACSAC '09, pp.484-493, 2009.

A. Goel, K. Po, K. Farhadi, Z. Li, and E. De-lara, The taser intrusion recovery system, Proceedings of the 20th ACM Symposium on Operating Systems Principles, ser. SOSP '05, pp.163-176, 2005.

T. Kim, X. Wang, N. Zeldovich, and M. F. Kaashoek, Intrusion recovery using selective re-execution, Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI'10. USENIX Association, pp.89-104, 2010.

F. Hsu, H. Chen, T. Ristenpart, J. Li, and Z. Su, Back to the future: A framework for automatic malware removal and system repair, Proceedings of the 22nd Annual Computer Security Applications Conference, ser. ACSAC '06, pp.257-268, 2006.

R. Chevalier, M. Villatel, D. Plaquin, and G. Hiet, Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode, Proceedings of the 33rd Annual Computer Security Applications Conference, ser. ACSAC '17, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01634566

J. Laprie, From dependability to resilience, 38th IEEE/IFIP International Conference On Dependable Systems and Networks, 2008.

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.

R. J. Ellison, D. A. Fisher, R. C. Linger, H. F. Lipson, and T. Longstaff, Survivable network systems: An emerging discipline, Tech. Rep, 1997.

J. C. Knight, E. A. Strunk, and K. J. Sullivan, Towards a rigorous definition of information system survivability, Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, vol.1, pp.78-89, 2003.

I. Kirillov, D. Beck, P. Chase, and R. Martin, Malware Attribute Enumeration and Characterization, 2011.

S. Barnum, Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX), 2014.

, CRIU, 2018.

. Snapper, the ultimate snapshot tool for linux, 2018.

, systemd system and service manager, 2018.

J. Corbet, Seccomp and sandboxing, 2009.

M. Kerrisk, Namespaces in operation, part 1: namespaces overview, LWN, 2013.