{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T16:03:00Z","timestamp":1773676980893,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,15]],"date-time":"2008-07-15T00:00:00Z","timestamp":1216080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,15]]},"DOI":"10.1145\/1600176.1600183","type":"proceedings-article","created":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T12:53:09Z","timestamp":1252414389000},"page":"43-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Self-healing"],"prefix":"10.1145","author":[{"given":"Michael E.","family":"Locasto","sequence":"first","affiliation":[{"name":"Columbia University"}]}],"member":"320","published-online":{"date-parts":[[2008,7,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Bhatkar S.","year":"2006","unstructured":"Bhatkar , S. , Chaturvedi , A. , and Sekar ., R. Improving Attack Detection in Host-Based IDS by Learning Properties of System Call Arguments . In Proceedings of the IEEE Symposium on Security and Privacy ( 2006 ). Bhatkar, S., Chaturvedi, A., and Sekar., R. Improving Attack Detection in Host-Based IDS by Learning Properties of System Call Arguments. In Proceedings of the IEEE Symposium on Security and Privacy (2006)."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 14 th Symposium on Network&amp;Distributed System Security (NDSS) (Feb","author":"Borisov N.","year":"2007","unstructured":"Borisov , N. , Brumley , D. J. , Wang , H. J. , Dunagan , J. , Joshi , P. , and Guo , C . A Generic Application-Level Protocol Analyzer and its Language . In Proceedings of the 14 th Symposium on Network&amp;Distributed System Security (NDSS) (Feb 2007 ). Borisov, N., Brumley, D. J., Wang, H. J., Dunagan, J., Joshi, P., and Guo, C. A Generic Application-Level Protocol Analyzer and its Language. In Proceedings of the 14 th Symposium on Network&amp;Distributed System Security (NDSS) (Feb 2007)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.41"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_3_2_1_6_1","volume-title":"Crash-Only Software. In Proceedings of the 9 th Workshop on Hot Topics in Operating Systems (HOTOS-IX) (May","author":"Candea G.","year":"2003","unstructured":"Candea , G. , and Fox , A . Crash-Only Software. In Proceedings of the 9 th Workshop on Hot Topics in Operating Systems (HOTOS-IX) (May 2003 ). Candea, G., and Fox, A. Crash-Only Software. In Proceedings of the 9 th Workshop on Hot Topics in Operating Systems (HOTOS-IX) (May 2003)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294274"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Cowan C.","year":"1998","unstructured":"Cowan , C. , Pu , C. , Maier , D. , Hinton , H. , Walpole , J. , Bakke , P. , Beattie , S. , Grier , A. , Wagle , P. , and Zhang , Q . Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks . In Proceedings of the USENIX Security Symposium ( 1998 ). Cowan, C., Pu, C., Maier, D., Hinton, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., and Zhang, Q. Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proceedings of the USENIX Security Symposium (1998)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102152"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.34"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949314"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830554"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.34"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030126"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_10"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298081.1298084"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720293"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102150"},{"key":"e_1_3_2_1_22_1","first-page":"219","volume-title":"Proceedings of the USENIX Annual Technical Conference (June","author":"Locasto M. E.","year":"2007","unstructured":"Locasto , M. E. , Stavrou , A. , Cretu , G. F. , and Keromytis , A. D . From STEM to SEAD: Speculative Execution for Automatic Defense . In Proceedings of the USENIX Annual Technical Conference (June 2007 ), pp. 219 -- 232 . Locasto, M. E., Stavrou, A., Cretu, G. F., and Keromytis, A. D. From STEM to SEAD: Speculative Execution for Automatic Defense. In Proceedings of the USENIX Annual Technical Conference (June 2007), pp. 219--232."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127348"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 13 th Symposium on Network and Distributed System Security (NDSS 2006)","author":"Newsome J.","year":"2006","unstructured":"Newsome , J. , Brumley , D. , and Song , D . Vulnerability--Specific Execution Filtering for Exploit Prevention on Commodity Software . In Proceedings of the 13 th Symposium on Network and Distributed System Security (NDSS 2006) ( February 2006 ). Newsome, J., Brumley, D., and Song, D. Vulnerability--Specific Execution Filtering for Exploit Prevention on Commodity Software. In Proceedings of the 13 th Symposium on Network and Distributed System Security (NDSS 2006) (February 2006)."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 12 th Symposium on Network and Distributed System Security (NDSS) (February","author":"Newsome J.","year":"2005","unstructured":"Newsome , J. , and Song , D . Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In Proceedings of the 12 th Symposium on Network and Distributed System Security (NDSS) (February 2005 ). Newsome, J., and Song, D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the 12 th Symposium on Network and Distributed System Security (NDSS) (February 2005)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_1_27_1","volume-title":"J. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In Proceedings 6 th Symposium on Operating Systems Design and Implementation (OSDI) (December","author":"Rinard M.","year":"2004","unstructured":"Rinard , M. , Cadar , C. , Dumitran , D. , Roy , D. , Leu , T. , and W Beebee , J. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In Proceedings 6 th Symposium on Operating Systems Design and Implementation (OSDI) (December 2004 ). Rinard, M., Cadar, C., Dumitran, D., Roy, D., Leu, T., and W Beebee, J. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In Proceedings 6 th Symposium on Operating Systems Design and Implementation (OSDI) (December 2004)."},{"key":"e_1_3_2_1_28_1","first-page":"149","volume-title":"Proceedings of the USENIX Annual Technical Conference (April","author":"Sidiroglou S.","year":"2005","unstructured":"Sidiroglou , S. , Locasto , M. E. , Boyd , S. W. , and Keromytis , A. D . Building a Reactive Immune System for Software Services . In Proceedings of the USENIX Annual Technical Conference (April 2005 ), pp. 149 -- 161 . Sidiroglou, S., Locasto, M. E., Boyd, S. W., and Keromytis, A. D. Building a Reactive Immune System for Software Services. In Proceedings of the USENIX Annual Technical Conference (April 2005), pp. 149--161."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 9 th USENIX Security Symposium (August","author":"Somayaji A.","year":"2000","unstructured":"Somayaji , A. , and Forrest , S . Automated Response Using System-Call Delays . In Proceedings of the 9 th USENIX Security Symposium (August 2000 ). Somayaji, A., and Forrest, S. Automated Response Using System-Call Delays. In Proceedings of the 9 th USENIX Security Symposium (August 2000)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315312"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278940.1278945"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015489"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102151"}],"event":{"name":"NSPW '07: Proceedings of the 2007 New Security Paradigms Workshop","location":"New Hampshire","acronym":"NSPW '07","sponsor":["San Diego Super Computing Ctr San Diego Super Computing Ctr","James Madison University","ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 2007 Workshop on New Security Paradigms"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1600176.1600183","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1600176.1600183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:16Z","timestamp":1750249096000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1600176.1600183"}},"subtitle":["science, engineering, and fiction"],"short-title":[],"issued":{"date-parts":[[2008,7,15]]},"references-count":33,"alternative-id":["10.1145\/1600176.1600183","10.1145\/1600176"],"URL":"https:\/\/doi.org\/10.1145\/1600176.1600183","relation":{},"subject":[],"published":{"date-parts":[[2008,7,15]]},"assertion":[{"value":"2008-07-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}