What's wrong with risk matrices, Apache HTTP Server, vol.28, pp.497-512, 2008. ,
, The Linux Audit Project, 2019.
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14), pp.90-102, 2014. ,
Using Specification-Based Intrusion Detection for Automated Response, Recent Advances in Intrusion Detection, pp.136-154, 2003. ,
Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX), 2014. ,
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware, 38th IEEE/IFIP International Conference On Dependable Systems and Networks, pp.177-186, 2008. ,
Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode, Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC'17), pp.399-411, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01634566
, Seccomp and sandboxing. LWN, 2009.
Understanding Linux Malware, Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP '18, pp.161-175, 2018. ,
, CRIU, 2018.
, CryptoDrop, 2019.
Risk analysis in a linguistic environment: a fuzzy evidential reasoning-based approach, Expert Systems with Applications, vol.38, pp.15438-15446, 2011. ,
, Linux.Encoder.1, 2015.
, Linux.Rex.1, 2016.
, , 2018.
, Eclipse Foundation. 2019. Mosquitto. Retrieved, 2019.
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment, Proceedings of the International Conference on Dependable Systems and Networks (DSN '05, pp.508-517, 2005. ,
, Gitea, 2019.
, GitHub, 2019.
The Taser Intrusion Recovery System, Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP '05, pp.163-176, 2005. ,
Control Group v2, 2015. ,
, Remote LD_PRELOAD Exploitation, 2017.
HP Sure Start: Automatic Firmware Intrusion Detection and Repair, 2019. ,
Back to the Future: A Framework for Automatic Malware Removal and System Repair, Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC '06, pp.257-268, 2006. ,
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response, Proceedings of the 2016 IEEE Symposium on Security and Privacy, pp.618-635, 2016. ,
System Auditing, Red Hat Enterprise Linux 7 Security Guide, pp.185-204, 2017. ,
Postmark: A new file system benchmark, Network Appliance, 1997. ,
, Namespaces in operation, part 1: namespaces overview. LWN, 2013.
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp.3-24, 2015. ,
Cost Evaluation for Intrusion Response Using Dependency Graphs, International Conference on Network and Service Security, 2009. ,
Intrusion Recovery Using Selective Re-execution, Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10). USENIX Association, pp.89-104, 2010. ,
Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors, Proceeding of the 41st Annual International Symposium on Computer Architecture (ISCA '14), pp.361-372, 2014. ,
Malware Attribute Enumeration and Characterization, 2011. ,
Towards a rigorous definition of information system survivability, Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, vol.1, pp.78-89, 2003. ,
Spectre Attacks: Exploiting Speculative Execution, 40th IEEE Symposium on Security and Privacy (S&P'19), 2019. ,
The simple economics of cybercrimes, IEEE Security & Privacy, vol.4, issue.1, pp.33-39, 2006. ,
Phoronix Test Suite, 2019. ,
Meltdown: Reading Kernel Memory from User Space, 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, pp.973-990, 2018. ,
Survey of multi-objective optimization methods for engineering. Structural and Multidisciplinary Optimization, vol.26, pp.369-395, 2004. ,
, Compilebench, 2008.
Windows Integrity Mechanism Design, 2017. ,
Job Objects, 2018. ,
Protect important folders with controlled folder access, 2018. ,
Restricted Tokens, 2018. ,
Malware Capabilities, 2014. ,
Encyclopedia of Malware Attributes, 2019. ,
Selection of Pareto-efficient response plans based on financial and operational assessments, EURASIP Journal on Information Security, p.12, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01649965
Unit 42 Finds New Mirai and Gafgyt IoT/Linux Botnet Campaigns, 2018. ,
, SELinux, 2019.
A Fistful of Red-pills: How to Automatically Generate Procedures to Detect CPU Emulators, Proceedings of the 3rd USENIX Conference on Offensive Technologies (WOOT'09). USENIX Association, p.7, 2009. ,
BTRFS: The Linux B-tree Filesystem, ACM Transactions on Storage (TOS), vol.9, 2013. ,
Boot with Integrity, or Don't Boot, Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine, vol.6, pp.143-163, 2014. ,
, Windows Internals, 2012.
Exploiting the DRAM rowhammer bug to gain kernel privileges, 2015. ,
, Vegeta, 2019.
Dynamic Optimal Countermeasure Selection for Intrusion Response System, IEEE Transactions on Dependable and Secure Computing, vol.15, pp.755-770, 2018. ,
Enforcing Kernel Security Invariants with Data Flow Integrity, Proceedings of the 2016 Annual Network and Distributed System Security Symposium (NDSS '16), 2016. ,
, systemd System and Service Manager, 2019.
Gitea 1.4.0 Unauthenticated Remote Code Execution, 2018. ,
Evaluating the Impact of Automated Intrusion Response Mechanisms, Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC '02), 2002. ,
, Cryptocurrency Miner Distributed via PHP Weathermap Vulnerability, Targets Linux Servers. Retrieved, 2018.
Unified Extensible Firmware Interface Specification, 2019. ,
Handling SELinux-aware Applications, SELinux Cookbook, p.10, 2014. ,
Fast and Servicepreserving Recovery from Malware Infections Using CRIU, Proceedings of the 27th USENIX Security Symposium. USENIX Association, pp.1199-1211, 2018. ,
Risky Business, Security risk management: Building an information security risk management program from the Ground Up, vol.2, pp.37-40, 2011. ,
fs-mark, 2016. ,
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System, Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC '09), pp.484-493, 2009. ,
A Tour Beyond BIOS Supporting an SMM Resource Monitor using the EFI Developer Kit II, 2015. ,
A Tour Beyond BIOS -Memory Protection in UEFI BIOS, 2017. ,