Continuous auditing and threat detection in multi-cloud infrastructure

KA Torkura, MIH Sukmana, F Cheng, C Meinel - Computers & Security, 2021 - Elsevier
Efficient change control and configuration management is imperative for addressing the
emerging security threats in cloud infrastructure. These threats majorly exploit …

Test Selection for Unified Regression Testing

S Wang, X Lian, D Marinov, T Xu - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Today's software failures have two dominating root causes: code bugs and
misconfigurations. To combat failure-inducing software changes, unified regression testing …

MMRCA: multimodal root cause analysis

G White, J Diuwe, E Fonseca, O O'Brien - International Conference on …, 2021 - Springer
Cloud systems are becoming increasingly complex and more difficult for human operators to
manage due to the scale and interconnectedness of microservices. Increased observability …

ConfEx: A framework for automating text-based software configuration analysis in the cloud

O Tuncer, A Byrne, N Bila, S Duri, C Isci… - arXiv preprint arXiv …, 2020 - arxiv.org
Modern cloud services have complex architectures, often comprising many software
components, and depend on hundreds of configurations parameters to function correctly …

Towards non-intrusive software introspection and beyond

A Mohan, S Nadgowda, B Pipaliya… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
Continuous verification and security analysis of software systems are of paramount
importance to many organizations. The state-of-the-art for such operations implements agent …

Using Datalog for Effective Continuous Integration Policy Evaluation

K Loide, BRCA de Lima, P Jakovits… - … Conference on Software …, 2024 - Springer
Containerisation and microservices have introduced unprecedented complexity in system
configurations, exacerbating the blast zone of misconfigurations and system failures. This …

Provisioning Strategies for Centralized Bare-Metal Clusters

A Mohan - 2021 - search.proquest.com
Technological inertia leads many organizations to continue employing static provisioning
strategies for bare-metal deployments, resulting in architectural and runtime inefficiencies …

Check for Using Datalog for Effective Continuous Integration Policy Evaluation 9 Kaarel Loide², Bruno Rucy Carneiro Alves de Lima¹, 2 () İD Pelle Jakovits¹. and …

J Demidov - Software Quality as a Foundation for Security: 16th …, 2024 - books.google.com
Containerisation and microservices have introduced unprecedented complexity in system
configurations, exacerbating the blast zone of misconfigurations and system failures. This …

Filenail: Working with Incomplete Filesystem State

S Nadgowda - Proceedings of the 2020 6th International Workshop on …, 2020 - dl.acm.org
The use of filesystems has become a standard, with a purpose well beyond just storing and
accessing application data. For instance, common system security and compliance …

Reusing software tests for configuration testing: A case study of the Hadoop project

R Ang - 2019 - ideals.illinois.edu
Configuration is an inseparable piece of today's software development. Due to its dynamic
nature and lack of standardized checking procedure, misconfiguration has been one of the …