{"id":"https://openalex.org/W3091647382","doi":"https://doi.org/10.1109/acsos49614.2020.00022","title":"Self-Patch: Beyond Patch Tuesday for Containerized Applications","display_name":"Self-Patch: Beyond Patch Tuesday for Containerized Applications","publication_year":2020,"publication_date":"2020-08-01","ids":{"openalex":"https://openalex.org/W3091647382","doi":"https://doi.org/10.1109/acsos49614.2020.00022","mag":"3091647382"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/acsos49614.2020.00022","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072717905","display_name":"Olufogorehan Tunde-Onadele","orcid":"https://orcid.org/0009-0000-7996-2939"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"funder","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Olufogorehan Tunde-Onadele","raw_affiliation_strings":["Department of Computer Science, North Carolina State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016611001","display_name":"Yuhang Lin","orcid":"https://orcid.org/0000-0001-9446-2625"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"funder","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuhang Lin","raw_affiliation_strings":["Department of Computer Science, North Carolina State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080326162","display_name":"Jingzhu He","orcid":"https://orcid.org/0009-0005-9448-5022"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"funder","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jingzhu He","raw_affiliation_strings":["Department of Computer Science, North Carolina State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102976136","display_name":"Xiaohui Gu","orcid":"https://orcid.org/0000-0001-8811-0084"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"funder","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaohui Gu","raw_affiliation_strings":["Department of Computer Science, North Carolina State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.194,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.756486,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"21","last_page":"27"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.4997146}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76915884},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6937249},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.6176514},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4997146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49179867},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.48740417},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47476768},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.44075555},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22853544},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12484366},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/acsos49614.2020.00022","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W1985258161","https://openalex.org/W2076063813","https://openalex.org/W2128217000","https://openalex.org/W2161160262","https://openalex.org/W2598200822","https://openalex.org/W2637047286","https://openalex.org/W2751013686","https://openalex.org/W2752365765","https://openalex.org/W2767094836","https://openalex.org/W2773617611","https://openalex.org/W2889354405","https://openalex.org/W2891432086","https://openalex.org/W3100503250","https://openalex.org/W4238530616"],"related_works":["https://openalex.org/W3146804403","https://openalex.org/W2974221847","https://openalex.org/W2775844720","https://openalex.org/W2581710029","https://openalex.org/W2480624181","https://openalex.org/W2367301169","https://openalex.org/W2352134912","https://openalex.org/W2055230095","https://openalex.org/W2048054615","https://openalex.org/W2001079144"],"abstract_inverted_index":{"Containers":[0],"have":[1,12],"become":[2,31],"increasingly":[3],"popular":[4],"in":[5,91],"distributed":[6],"computing":[7],"environments.":[8],"However,":[9],"recent":[10],"studies":[11],"shown":[13],"that":[14,99],"containerized":[15,79],"applications":[16,56],"are":[17],"susceptible":[18],"to":[19,42,70,115],"various":[20],"security":[21,76],"attacks.":[22],"Traditional":[23],"periodically":[24],"scheduled":[25],"software":[26],"update":[27],"approaches":[28],"not":[29],"only":[30],"ineffective":[32],"under":[33],"dynamic":[34,67],"container":[35],"environments":[36],"but":[37],"also":[38],"impose":[39],"high":[40],"overhead":[41,112],"containers.":[43,59],"In":[44],"this":[45],"paper,":[46],"we":[47],"present":[48],"Self-Patch,":[49],"a":[50],"new":[51],"self-triggering":[52],"patching":[53,69,111],"framework":[54],"for":[55,78],"running":[57],"inside":[58],"Self-Patch":[60,100],"combines":[61],"light-weight":[62],"runtime":[63],"attack":[64],"detection":[65],"and":[66,74,104,109],"targeted":[68],"achieve":[71],"more":[72],"efficient":[73],"effective":[75],"protection":[77],"applications.":[80,96],"We":[81],"evaluated":[82],"our":[83],"schemes":[84],"over":[85],"31":[86],"real":[87],"world":[88],"vulnerability":[89],"attacks":[90,108],"23":[92],"commonly":[93],"used":[94],"server":[95],"Results":[97],"show":[98],"can":[101],"accurately":[102],"detect":[103],"classify":[105],"81%":[106],"of":[107],"reduce":[110],"by":[113],"up":[114],"84%.":[116]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3091647382","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-04-18T09:32:06.285096","created_date":"2020-10-08"}