Error detection/correction and fault detection/recovery – Data processing system error or fault handling – Reliability and availability
Reexamination Certificate
2005-06-01
2009-02-10
Baderman, Scott T (Department: 2114)
Error detection/correction and fault detection/recovery
Data processing system error or fault handling
Reliability and availability
C717S168000
Reexamination Certificate
active
07490268
ABSTRACT:
In accordance with the present invention, computer implemented methods and systems are provided that allow an application to automatically recover from software failures and attacks. Using one or more sensors, failures may be detected in the application. In response to detecting the failure, the portion of the application's code that caused the failure is isolated. Using the input vectors that caused the failure, information regarding the failure (e.g., the type of failure), a core dump file (e.g., stack trace), etc., an emulator-based vaccine that repairs the failure is constructed. In response to verifying that the vaccine repaired the failure, the application is automatically updated with the emulator-based vaccine without user intervention. Application community features that efficiently use the resources available in software monoculture is also provided. An application community may be defined that includes a plurality of devices and the application's code may be divided into smaller portions of code, which are assigned to each of the plurality of devices for monitoring. Each device also notifies the other devices of the failure.
REFERENCES:
patent: 5960170 (1999-09-01), Chen et al.
patent: 6067410 (2000-05-01), Nachenberg
patent: 6378087 (2002-04-01), Flanagan et al.
patent: 6553507 (2003-04-01), Cohen
patent: 6907396 (2005-06-01), Muttik et al.
patent: 7181652 (2007-02-01), Shortz
patent: 7409717 (2008-08-01), Szor
patent: 2002/0018528 (2002-02-01), Harada et al.
patent: 2002/0129277 (2002-09-01), Caccavale
patent: 2002/0184528 (2002-12-01), Shevenell et al.
patent: 2004/0153823 (2004-08-01), Ansari
patent: 2005/0015579 (2005-01-01), Grover et al.
patent: 2005/0071838 (2005-03-01), Hatasaki
patent: 2005/0086333 (2005-04-01), Chefalas et al.
patent: 2005/0086630 (2005-04-01), Chefalas et al.
patent: 2005/0114429 (2005-05-01), Caccavale
patent: 2005/0149749 (2005-07-01), Van Brabant
Sidiroglou, S.; Keromytis, A.D.; A network worm vaccine architecture. Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. Wet Ice 2003. Proceedings. Twelfth IEEE International Workshops on Jun. 9-11, 2003 pp. 220-225.
Costa et al. “Can We Contain Internet Worms ?”Microsoft Research, 2004, pp. 1-6.
Bowring et al. “Monitoring Deployed Software Using Software Tomography”Paste '02, 2002.
International Search Report and Written Opinion issued for corresponding International Application No. PCT/US2006/12839.
Amarasinghe, S.P. “On the Run—Building Dynamic Program Modifiers for Optimization, Introspection and Security,” In Conference on Programming Language Design and Implementation (PLDI), 2002.
Avizienis, A. “The n-version approach to fault-tolerant software,” IEEE Transactions on Software Engineering, 11(12):1491-1501, 1985.
Baratloo, A. et al., “Transparent Run-Time Defense Against Stack Smashing Attacks,” In Proceedings of the USENIX Annual Technical Conference, Jun. 2000.
Barrantes, E.G. et al., Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks, In Proceedings of the 10th ACM CCS, pp. 281-289, Oct. 2003.
Bhatkar, B. et al., “Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits,” In Proceedings of the 12th USENIX Security Symposium, pp. 105-120, Aug. 2003.
Brilliant, S. et al., “Analysis of Faults in an N-Version Software Experiment,” IEEE Transactions on Software Engineering, 16(2), Feb. 1990.
Bruening, D. et al., “An Infrastructure for Adpative Dynamic Optimization,” In Proceedings of the International Symposium on Code Generation and Optimization, pp. 265-275, 2003.
Candea, G. et al., “Crash-Only Software,” In Proceedings of the 9th Workshop on Hot Topics in Operating Systems, May 2003.
CERT Advisory CA-2003-21: W32/Blaster Worm. http://www.cert.org/advisories/CA-2003-20.html, Aug. 2003.
Chen, H. et al., “MOPS: an Infrastructure for Examining Security Properties of Software,” In the Proceedings of the ACM Computer and Communications Security (CCS) Conference, pp. 235-244, Nov. 2002.
Chew, M. et al., “Mitigating Buffer Overflows by Operating System Randomization,” Technical Report CMU-CS-02-197, Carnegie Mellon University, Dec. 2002.
Cowan, C. et al., “StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,” In Proceedings of the 7th USENIX Security Symposium, Jan. 1998.
Crosby, S.A. et al., “Denail of Service via Algorithmic Compleity Attacks,” In Proceedings of the 12th USENIX Security Symposium, pp. 29-44, Aug. 2003.
Demsky, B. et al., “Automatic Detection and Repair of Errors in Data Structures,” In Proceedings of the 18th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, Oct. 2003.
Dunlap, G.W. et al., “ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay,” In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), Feb. 2002.
Garfunkel, T. et al., “A Virtual Machine Introspection Based Architecture for Intrusion Detection,” In 10th ISOC Symposium on Network and Distributed Systems Security (SNDSS) Feb. 2003.
Geer, D.E. “Monopoly Considered Harmful,” IEEE Security & Privacy, 1(6):14 & 17, Nov./Dec. 2003.
Goth, G. “Addressing the Monoculture,” IEEE Security & Privacy, 1(6):8-10, Nov./Dec. 2003.
Jim, T. et al., “Cyclone: A safe dialect of C,” In Proceedings of the USENIX Annual Technical Conference, pp. 275-288, Jun. 2002.
Kc, S. et al., “Countering Code-Injection Attacks With Instruction-Set Randomization,” In 10th ACM Conference on Computer and Communications Security (CCS), Oct. 2003.
King, S.T. et al., “Backtracking Intrusions,” In 19th ACM Symposium on Operating Systems Principles (SOSP), Oct. 2003.
King, S.T. et al., “Operating System Support for Virtual Machines,” In Proceedings of the USENIX Annual Technical Conference, Jun. 2003.
Kiriansky, V. et al., “Secure Execution Via Program Sheparding,” In Proceedings of the 11th USENIX Security Symposium, Aug. 2002.
Locasto, M.E. et al., “Application Communities: Using Monoculture for Dependability,” In Proceedings of the1stWorkshop on Hot Topics in System Dependability(HotDep), held in conjunction with the International Conference on Dependable Systems and Networks (DSN), pp. 288-292. Jun. 2005, Yokohama, Japan.
Locasto, M.E. et al., “Softwar Self-Healing Using Collaborative Application Communities,” In Proceedings of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS), pp. 95-106. Feb. 2006, San Diego, CA.
Mosberger, D. et al., “httperf: A tool for measuring web server performance,” In First Workshop on Internet Server Performance, pp. 59-67, ACM, Jun. 1998.
Nethercote, N. et al., “Valgrind: A Program Supervision Framework,” In Electronic Notes in Theoretical Computer Science, vol. 89, 2003.
Newsome, J. et al., “Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software,” In The 12th Annual Network and Distributed System Security Symposium, Feb. 2005.
Oplinger, J. et al., “Enhancing Software Reliability with Speculative Threads,” In Proceedings of the 10th Internatioal Conference on Architectural Support for Programming Language and Operating Systems (ASPLOS X), Oct. 2002.
Prevelakis, V. “A Secure Station for Network Monitoring and Control,” In Proceedings of the 8th USENIX Security Symposium, Aug. 1999.
Provos, N. “Improving Host Security with System Call Policies,” In Proceedings of the 12 USENIX Security Symposium, pp. 257-272, Aug. 2003.
Reynolds, J.C. et al., “On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-Test, and Generalization,”
Keromytis Angelos D.
Locasto Michael
Sidiroglou Stylianos
Baderman Scott T
Byrne Poh LLP
Contino Paul F.
The Trustees of Columbia University in the City of New York
LandOfFree
Methods and systems for repairing applications does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems for repairing applications, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for repairing applications will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4069864