{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:20Z","timestamp":1750306880829,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,3]],"date-time":"2012-12-03T00:00:00Z","timestamp":1354492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,3]]},"DOI":"10.1145\/2420950.2421005","type":"proceedings-article","created":{"date-parts":[[2012,12,19]],"date-time":"2012-12-19T14:12:22Z","timestamp":1355926342000},"page":"379-388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Self-healing multitier architectures using cascading rescue points"],"prefix":"10.1145","author":[{"given":"Angeliki","family":"Zavou","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY"}]},{"given":"Georgios","family":"Portokalidis","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY"}]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY"}]}],"member":"320","published-online":{"date-parts":[[2012,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380230603"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0226"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_2_1_5_1","first-page":"3","volume-title":"Proc. of the 7th Symposium on Reliable Distributed Systems","author":"Bhargava B.","year":"1998","unstructured":"B. Bhargava and S. Lian . Independent checkpointing and concurrent rollback for recovery in distributed systems-an optimistic approach . In Proc. of the 7th Symposium on Reliable Distributed Systems , pages 3 -- 12 , October 1998 . B. Bhargava and S. Lian. Independent checkpointing and concurrent rollback for recovery in distributed systems-an optimistic approach. In Proc. of the 7th Symposium on Reliable Distributed Systems, pages 3--12, October 1998."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224058"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/109434200001400404"},{"key":"e_1_3_2_1_8_1","first-page":"209","volume-title":"Proc. of the 8th OSDI","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs . In Proc. of the 8th OSDI , pages 209 -- 224 , 2008 . C. Cadar, D. Dunbar, and D. Engler. KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In Proc. of the 8th OSDI, pages 209--224, 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of the 9th Workshop on Hot Topics in Operating Systems (HotOS IX)","author":"Candea G.","year":"2003","unstructured":"G. Candea and A. Fox . Crash-only software . In Proc. of the 9th Workshop on Hot Topics in Operating Systems (HotOS IX) , May 2003 . G. Candea and A. Fox. Crash-only software. In Proc. of the 9th Workshop on Hot Topics in Operating Systems (HotOS IX), May 2003."},{"key":"e_1_3_2_1_10_1","unstructured":"J. Etoh. GCC extension for protecting applications from stack-smashing attacks. http:\/\/www.trl.ibm.com\/projects\/security\/ssp\/.  J. Etoh. GCC extension for protecting applications from stack-smashing attacks. http:\/\/www.trl.ibm.com\/projects\/security\/ssp\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108970.1108971"},{"key":"e_1_3_2_1_12_1","volume-title":"November","author":"Howard M.","year":"2005","unstructured":"M. Howard . A look inside the security development lifecycle at microsoft. MSDN Magazine -- http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc163705.aspx , November 2005 . M. Howard. A look inside the security development lifecycle at microsoft. MSDN Magazine -- http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc163705.aspx, November 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/874064.875631"},{"key":"e_1_3_2_1_14_1","unstructured":"InformationWeek. Windows home server bug could lead to data loss. http:\/\/informationweek.com\/news\/205205974 December 2007.  InformationWeek. Windows home server bug could lead to data loss. http:\/\/informationweek.com\/news\/205205974 December 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73986-9_2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247361"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273031"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060323"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_22_1","volume-title":"Mar","author":"Project X","year":"2003","unstructured":"Pa X Project . Address space layout randomization , Mar 2003 . http:\/\/pageexec.virtualave.net\/docs\/aslr.txt. PaX Project. Address space layout randomization, Mar 2003. http:\/\/pageexec.virtualave.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_23_1","unstructured":"PCWorld. Amazon EC2 outage shows risks of cloud. http:\/\/www.pcworld.com\/businesscenter\/article\/226199\/amazon_ec2_outage_shows_risks_of_cloud.html April 2011.  PCWorld. Amazon EC2 outage shows risks of cloud. http:\/\/www.pcworld.com\/businesscenter\/article\/226199\/amazon_ec2_outage_shows_risks_of_cloud.html April 2011."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_25_1","first-page":"18","volume-title":"Proceedings of the USENIX 1995 Technical Conference Proceedings, TCON'95","author":"Plank J. S.","year":"1995","unstructured":"J. S. Plank , M. Beck , G. Kingsley , and K. Li . Libckpt: transparent checkpointing under unix . In Proceedings of the USENIX 1995 Technical Conference Proceedings, TCON'95 , pages 18 -- 18 , Berkeley, CA, USA , 1995 . USENIX Association. J. S. Plank, M. Beck, G. Kingsley, and K. Li. Libckpt: transparent checkpointing under unix. In Proceedings of the USENIX 1995 Technical Conference Proceedings, TCON'95, pages 18--18, Berkeley, CA, USA, 1995. USENIX Association."},{"key":"e_1_3_2_1_26_1","volume-title":"SRI International","author":"Porras P.","year":"2009","unstructured":"P. Porras , H. Saidi , and V. Yegneswaran . Conficker C analysis. Technical report , SRI International , 2009 . P. Porras, H. Saidi, and V. Yegneswaran. Conficker C analysis. Technical report, SRI International, 2009."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920268"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2075658.2075661"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of the 6th OSDI","author":"Rinard M.","year":"2004","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. Roy , T. Leu , and J. W Beebee . Enhancing server availability and security through failure-oblivious computing . In Proc. of the 6th OSDI , December 2004 . M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and J. W Beebee. Enhancing server availability and security through failure-oblivious computing. In Proc. of the 6th OSDI, December 2004."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of the 2005 USENIX ATC","author":"Sidiroglou S.","year":"2005","unstructured":"S. Sidiroglou , M. E. Locasto , S. W. Boyd , and A. D. Keromytis . Building a reactive immune system for software services . In Proc. of the 2005 USENIX ATC , April 2005 . S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In Proc. of the 2005 USENIX ATC, April 2005."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/72981.72997"},{"key":"e_1_3_2_1_33_1","volume-title":"Third Edition: The Sockets Networking API. Addison Wesley","author":"Stevens W. R.","year":"2003","unstructured":"W. R. Stevens , B. Fenner , and A. M. Rudoff . Chapter 24. Out-of-Band Data. In UNIX Network Programming Volume 1 , Third Edition: The Sockets Networking API. Addison Wesley , 2003 . W. R. Stevens, B. Fenner, and A. M. Rudoff. Chapter 24. Out-of-Band Data. In UNIX Network Programming Volume 1, Third Edition: The Sockets Networking API. Addison Wesley, 2003."},{"key":"e_1_3_2_1_34_1","first-page":"2","volume-title":"21st International Symposium on Fault Tolerant Computing (FTCS-21)","author":"Sullivan M.","year":"1991","unstructured":"M. Sullivan and R. Chillarege . Software defects and their impact on system availability - A study of field failures in operating systems. In Digest of Papers ., 21st International Symposium on Fault Tolerant Computing (FTCS-21) , pages 2 -- 9 , 1991 . M. Sullivan and R. Chillarege. Software defects and their impact on system availability - A study of field failures in operating systems. In Digest of Papers., 21st International Symposium on Fault Tolerant Computing (FTCS-21), pages 2--9, 1991."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2006.3"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(87)90203-1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.13"}],"event":{"name":"ACSAC '12: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Orlando Florida USA","acronym":"ACSAC '12"},"container-title":["Proceedings of the 28th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2421005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2420950.2421005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:33Z","timestamp":1750234713000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2421005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,3]]},"references-count":37,"alternative-id":["10.1145\/2420950.2421005","10.1145\/2420950"],"URL":"https:\/\/doi.org\/10.1145\/2420950.2421005","relation":{},"subject":[],"published":{"date-parts":[[2012,12,3]]},"assertion":[{"value":"2012-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}