{"id":"https://openalex.org/W2990039003","doi":"https://doi.org/10.1145/3359789.3359792","title":"Survivor","display_name":"Survivor","publication_year":2019,"publication_date":"2019-11-22","ids":{"openalex":"https://openalex.org/W2990039003","doi":"https://doi.org/10.1145/3359789.3359792","mag":"2990039003"},"language":"en","primary_location":{"id":"doi:10.1145/3359789.3359792","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3359789.3359792","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1912.06863","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051495407","display_name":"Ronny Chevalier","orcid":"https://orcid.org/0000-0002-7479-4988"},"institutions":[{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en sciences et technologies du num\u00e9rique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I1324840837","display_name":"Hewlett-Packard (United States)","ror":"https://ror.org/059rn9488","country_code":"US","type":"company","lineage":["https://openalex.org/I1324840837"]}],"countries":["FR","US"],"is_corresponding":true,"raw_author_name":"Ronny Chevalier","raw_affiliation_strings":["Inria, CNRS, IRISA","HP Labs"],"affiliations":[{"raw_affiliation_string":"Inria, CNRS, IRISA","institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I2802519937"]},{"raw_affiliation_string":"HP Labs","institution_ids":["https://openalex.org/I1324840837"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078241470","display_name":"David Plaquin","orcid":null},"institutions":[{"id":"https://openalex.org/I1324840837","display_name":"Hewlett-Packard (United States)","ror":"https://ror.org/059rn9488","country_code":"US","type":"company","lineage":["https://openalex.org/I1324840837"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Plaquin","raw_affiliation_strings":["HP Labs"],"affiliations":[{"raw_affiliation_string":"HP Labs","institution_ids":["https://openalex.org/I1324840837"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080333458","display_name":"Chris Dalton","orcid":"https://orcid.org/0000-0003-2007-6507"},"institutions":[{"id":"https://openalex.org/I1324840837","display_name":"Hewlett-Packard (United States)","ror":"https://ror.org/059rn9488","country_code":"US","type":"company","lineage":["https://openalex.org/I1324840837"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chris Dalton","raw_affiliation_strings":["HP Labs"],"affiliations":[{"raw_affiliation_string":"HP Labs","institution_ids":["https://openalex.org/I1324840837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026667916","display_name":"Guillaume Hiet","orcid":"https://orcid.org/0000-0002-7176-9760"},"institutions":[{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en sciences et technologies du num\u00e9rique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Guillaume Hiet","raw_affiliation_strings":["Inria, CNRS, IRISA"],"affiliations":[{"raw_affiliation_string":"Inria, CNRS, IRISA","institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I2802519937"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051495407"],"corresponding_institution_ids":["https://openalex.org/I1324840837","https://openalex.org/I1326498283","https://openalex.org/I2802519937"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.14956667,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"762","last_page":"775"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7846479415893555},{"id":"https://openalex.org/keywords/survivability","display_name":"Survivability","score":0.7630791664123535},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.7001115083694458},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5846174359321594},{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.5718345642089844},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4971332848072052},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4918115437030792},{"id":"https://openalex.org/keywords/orchestration","display_name":"Orchestration","score":0.4848138391971588},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.47832727432250977},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.47817474603652954},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.45866313576698303},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4569959044456482},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.45637500286102295},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.4280984401702881},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4268217384815216}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7846479415893555},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.7630791664123535},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.7001115083694458},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5846174359321594},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.5718345642089844},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4971332848072052},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4918115437030792},{"id":"https://openalex.org/C199168358","wikidata":"https://www.wikidata.org/wiki/Q3367000","display_name":"Orchestration","level":3,"score":0.4848138391971588},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47832727432250977},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.47817474603652954},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.45866313576698303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4569959044456482},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.45637500286102295},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.4280984401702881},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4268217384815216},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C558565934","wikidata":"https://www.wikidata.org/wiki/Q2743","display_name":"Musical","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3359789.3359792","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3359789.3359792","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1912.06863","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1912.06863","pdf_url":"https://arxiv.org/pdf/1912.06863","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:HAL:hal-02289315v2","is_oa":false,"landing_page_url":"https://inria.hal.science/hal-02289315","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.acsac.org/","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1912.06863","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1912.06863","pdf_url":"https://arxiv.org/pdf/1912.06863","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W7103708","https://openalex.org/W17390021","https://openalex.org/W37575475","https://openalex.org/W106162958","https://openalex.org/W1584620713","https://openalex.org/W1721587744","https://openalex.org/W1964802076","https://openalex.org/W1997188340","https://openalex.org/W2063373779","https://openalex.org/W2093406244","https://openalex.org/W2097209984","https://openalex.org/W2097688220","https://openalex.org/W2115175195","https://openalex.org/W2117180497","https://openalex.org/W2119359024","https://openalex.org/W2136015481","https://openalex.org/W2137749025","https://openalex.org/W2138357890","https://openalex.org/W2143659423","https://openalex.org/W2157116240","https://openalex.org/W2168872572","https://openalex.org/W2293351723","https://openalex.org/W2294454994","https://openalex.org/W2515891506","https://openalex.org/W2527760048","https://openalex.org/W2575425722","https://openalex.org/W2724727383","https://openalex.org/W2774602685","https://openalex.org/W2788068144","https://openalex.org/W2794801050","https://openalex.org/W2883613460","https://openalex.org/W2963311060","https://openalex.org/W3103647149","https://openalex.org/W3186276894","https://openalex.org/W4245276998","https://openalex.org/W4255411440","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2908775618","https://openalex.org/W2278169311","https://openalex.org/W2389356976","https://openalex.org/W31515701","https://openalex.org/W2482004134","https://openalex.org/W2163507572","https://openalex.org/W1969635302","https://openalex.org/W2183313954","https://openalex.org/W2080453744","https://openalex.org/W2388470051"],"abstract_inverted_index":{"Despite":[0],"the":[1,9,50,63,78,101,121,138,141,173],"deployment":[2],"of":[3,14,36,80,123,129,140,160,176],"preventive":[4],"security":[5],"mechanisms":[6],"to":[7,26,61,66,73,87,97,154],"protect":[8],"assets":[10],"and":[11,39,119,149],"computing":[12],"platforms":[13],"users,":[15],"intrusions":[16],"eventually":[17],"occur.":[18],"We":[19,90,114],"propose":[20],"a":[21,53,92,105,116,168,185,190],"novel":[22],"intrusion":[23],"survivability":[24],"approach":[25,31,47,125],"withstand":[27],"ongoing":[28],"intrusions.":[29,130],"Our":[30],"relies":[32],"on":[33],"an":[34,46],"orchestration":[35],"fine-grained":[37],"recovery":[38],"per-service":[40],"responses":[41],"(e.g.,":[42],"privileges":[43],"removal).":[44],"Such":[45],"may":[48],"put":[49],"system":[51,64],"into":[52],"degraded":[54,57,106],"mode.":[55],"This":[56],"mode":[58],"prevents":[59],"attackers":[60],"reinfect":[62,74],"or":[65],"achieve":[67],"their":[68],"goals":[69],"if":[70],"they":[71],"managed":[72],"it.":[75],"It":[76],"maintains":[77],"availability":[79],"core":[81,109],"functions":[82,110],"while":[83,100],"waiting":[84],"for":[85],"patches":[86],"be":[88],"deployed.":[89],"devised":[91],"cost-sensitive":[93],"response":[94],"selection":[95],"process":[96],"ensure":[98],"that":[99,134,143,150,178],"service":[102],"is":[103],"in":[104,163,172,184],"mode,":[107],"its":[108],"are":[111],"still":[112],"operating.":[113],"built":[115],"Linux-based":[117],"prototype":[118],"evaluated":[120],"effectiveness":[122],"our":[124,135],"against":[126],"different":[127],"types":[128],"The":[131],"results":[132],"show":[133],"solution":[136],"removes":[137],"effects":[139],"intrusions,":[142],"it":[144,151],"can":[145],"select":[146],"appropriate":[147],"responses,":[148],"allows":[152],"services":[153,177],"survive":[155],"when":[156],"reinfected.":[157],"In":[158],"terms":[159],"performance":[161],"overhead,":[162,170],"most":[164],"cases,":[165],"we":[166,188],"observed":[167,189],"small":[169,181],"except":[171],"rare":[174],"case":[175],"write":[179],"many":[180],"files":[182],"asynchronously":[183],"burst,":[186],"where":[187],"higher":[191],"but":[192],"acceptable":[193],"overhead.":[194]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2019-12-05T00:00:00"}
