{"id":"https://openalex.org/W4244903884","doi":"https://doi.org/10.1504/ijics.2016.10001273","title":"Towards service continuity for transactional applications via diverse device drivers","display_name":"Towards service continuity for transactional applications via diverse device drivers","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W4244903884","doi":"https://doi.org/10.1504/ijics.2016.10001273"},"language":"en","primary_location":{"id":"doi:10.1504/ijics.2016.10001273","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijics.2016.10001273","pdf_url":null,"source":{"id":"https://openalex.org/S85012289","display_name":"International Journal of Information and Computer Security","issn_l":"1744-1765","issn":["1744-1765","1744-1773"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information and Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Peng Liu","raw_affiliation_strings":["Pennsylvania State University, University Park, PA 16802, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, University Park, PA 16802, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015456692","display_name":"Xiaoqi Jia","orcid":"https://orcid.org/0000-0002-8376-3235"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoqi Jia","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100195, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100195, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027504758","display_name":"Shengzhi Zhang","orcid":"https://orcid.org/0000-0001-9432-9779"},"institutions":[{"id":"https://openalex.org/I106959904","display_name":"Florida Institute of Technology","ror":"https://ror.org/04atsbb87","country_code":"US","type":"education","lineage":["https://openalex.org/I106959904"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shengzhi Zhang","raw_affiliation_strings":["Florida Institute of Technology, Melbourne, FL 32901, USA"],"affiliations":[{"raw_affiliation_string":"Florida Institute of Technology, Melbourne, FL 32901, USA","institution_ids":["https://openalex.org/I106959904"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100346828"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38350174,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"4","first_page":"382","last_page":"382"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8693059086799622},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.7653412818908691},{"id":"https://openalex.org/keywords/reboot","display_name":"Reboot","score":0.586784839630127},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5821746587753296},{"id":"https://openalex.org/keywords/rootkit","display_name":"Rootkit","score":0.451568603515625},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.4446547329425812},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.44354724884033203},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.4360363781452179},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4325179159641266},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.41578489542007446},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41134339570999146},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3589848279953003},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.31819769740104675},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.19127222895622253}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8693059086799622},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.7653412818908691},{"id":"https://openalex.org/C120524526","wikidata":"https://www.wikidata.org/wiki/Q1709148","display_name":"Reboot","level":2,"score":0.586784839630127},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5821746587753296},{"id":"https://openalex.org/C10144332","wikidata":"https://www.wikidata.org/wiki/Q14645","display_name":"Rootkit","level":3,"score":0.451568603515625},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.4446547329425812},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.44354724884033203},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.4360363781452179},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4325179159641266},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.41578489542007446},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41134339570999146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3589848279953003},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.31819769740104675},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.19127222895622253},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijics.2016.10001273","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijics.2016.10001273","pdf_url":null,"source":{"id":"https://openalex.org/S85012289","display_name":"International Journal of Information and Computer Security","issn_l":"1744-1765","issn":["1744-1765","1744-1773"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information and Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2393767428","https://openalex.org/W1979469929","https://openalex.org/W2550565492","https://openalex.org/W2148749405","https://openalex.org/W2104105430","https://openalex.org/W2150403335","https://openalex.org/W1515917392","https://openalex.org/W2743348030","https://openalex.org/W1973516247","https://openalex.org/W2062201771"],"abstract_inverted_index":{"Existing":[0],"techniques,":[1],"such":[2,119],"as":[3,10,14],"state":[4],"roll-back":[5],"or":[6],"replay":[7],"can":[8,144],"preserve":[9],"much":[11],"accumulated":[12,63],"'state'":[13],"possible":[15],"when":[16,22],"one":[17],"application":[18,88],"is":[19,26,41],"compromised.":[20],"However,":[21],"operating":[23,38,79],"system":[24,80],"kernel":[25],"compromised,":[27],"e.g.,":[28],"driver":[29,83,114],"vulnerability":[30],"exploitation,":[31],"the":[32,50,98,141,158,161,178],"default":[33],"behaviour":[34],"of":[35,106,160],"most":[36],"commodity":[37],"systems":[39],"today":[40],"to":[42,55,73,77,130,156,171],"reboot":[43],"from":[44,113],"a":[45,128],"clean":[46],"initial":[47],"state.":[48],"All":[49],"running":[51],"applications":[52],"also":[53],"need":[54],"be":[56],"terminated":[57],"and":[58,92,103,125,134,146,151,168,174],"restarted,":[59],"thus":[60,109],"losing":[61],"their":[62],"'work":[64],"in":[65,177],"progress'":[66],"states.":[67],"In":[68],"this":[69],"paper,":[70],"we":[71,96],"propose":[72],"leverage":[74],"virtualisation":[75],"technique":[76],"produce":[78],"replicas":[81],"with":[82],"diversity.":[84],"By":[85],"replicating":[86],"transactional":[87,107],"on":[89,122,127],"each":[90],"replica":[91],"loosely":[93],"synchronising":[94],"them,":[95],"validate":[97],"output,":[99],"critical":[100],"memory":[101],"regions":[102],"persistent":[104],"data":[105],"applications,":[108],"detecting":[110],"intrusion":[111,154],"stemming":[112],"code":[115],"vulnerability.":[116],"We":[117,164],"implement":[118],"diversity":[120],"approach":[121,143],"Xen":[123],"hypervisor,":[124],"rely":[126],"proxy":[129],"conduct":[131],"request":[132],"replication":[133],"response":[135,155,172],"validation.":[136],"Our":[137],"evaluation":[138],"demonstrates":[139],"that":[140],"proposed":[142],"accurately":[145],"immediately":[147],"detect":[148],"driver-bug-orientated":[149],"exploitation":[150],"achieve":[152],"on-the-fly":[153],"ensure":[157],"correctness/continuity":[159],"applications'":[162],"execution.":[163],"only":[165],"incur":[166],"4.44%":[167],"4.7%":[169],"overhead":[170],"time":[173],"CPU":[175],"respectively":[176],"best":[179],"case.":[180]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
