Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joshua Levy is active.

Publication


Featured researches published by Joshua Levy.


international workshop on security | 2002

An Architecture for an Adaptive Intrusion-Tolerant Server

Alfonso Valdes; Magnus Almgren; Steven Cheung; Yves Deswarte; Bruno Dutertre; Joshua Levy; Hassen Saïdi; Victoria Stavridou; Tomás E. Uribe

We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on diverse operating systems and platforms, hardened intrusion-tolerance proxies that mediate client requests and verify the behavior of servers and other proxies, and monitoring and alert management components based on the EMERALD intrusion-detection framework. Integrity and availability are maintained by dynamically adapting the system configuration in response to intrusions or other faults. The dynamic configuration specifies the servers assigned to each client request, the agreement protocol used to validate server replies, and the resources spent on monitoring and detection. Alerts trigger increasingly strict regimes to ensure continued service, with graceful degradation of performance, even if some servers or proxies are compromised or faulty. The system returns to less stringent regimes as threats diminish. Servers and proxies can be isolated, repaired, and reinserted without interrupting service.


computer and communications security | 2003

Self-regenerative software components

Hassen Saïdi; Bruno Dutertre; Joshua Levy; Alfonso Valdes

Self-regenerative capabilities are a new trend in survivable system design. Self-regeneration ensures the property that a systems vulnerabilities cannot be exploited to the extent that the mission objective is compromised, but instead that the vulnerabilities are eventually removed, and system functionality is restored. To establish the usefulness of self-regenerative capabilities in the design of survivable systems, it is important to ensure that a system satisfying the self-regenerative requirement is survivable, and software engineering practices and tool support are available for building self-regenerative systems. This paper emphasizes the need for formal definition of the concept of self-regenerative systems in general and self-regenerative software components in particular. We propose a simple formal definition of a self-regenerative software component and we propose to adapt well-established formal software validation techniques to build tool support to implement self-regenerative capabilities at the component level.


Electronic Notes in Theoretical Computer Science | 2002

Combining Monitors for Runtime System Verification

Joshua Levy; Hassen Saïdi; Tomás E. Uribe

Abstract Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, such as general-purpose operating systems and software libraries, and when the properties of interest include security and performance. The challenge is to find reliable ways to monitor these properties in realistic systems. In particular, it is important to have assurance that violations will be reported when they actually occur. For instance, a monitor may not detect a security violation if the violation results from a series of system events that are not in its model. We describe how combining runtime monitors for diverse features such as memory management, security-related events, performance data, and higher-level temporal properties can result in more effective runtime verification. After discussing some basic notions for combining and relating monitors, we illustrate their application in an intrusion-tolerant Web server architecture under development at SRI.


darpa information survivability conference and exposition | 2003

Dependable Intrusion Tolerance: technology demo

Alfonso Valdes; Magnus Almgren; Steven Cheung; Yves Deswarte; Bruno Dutertre; Joshua Levy; Hassen Saïdi; Victoria Stavridou; Tomás E. Uribe

The Dependable Intrusion Tolerance (DIT) architecture is a flexible, adaptive, and intrusion-tolerant server design. We briefly discuss its prototype implementation and validation, and demonstrate how it resists sample attacks.


Archive | 2004

Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust

Bruno Dutertre; Steven Cheung; Joshua Levy


Archive | 2004

An Adaptive Intrusion-Tolerant Server Architecture

Alfonso Valdes; Magnus Almgren; Steven Cheung; Yves Deswartey; Bruno Dutertre; Joshua Levy; H. Sadi; Victoria Stavridou-Coleman; Tomás E. Uribe


Archive | 2014

Dynamically evolving cognitive architecture system based on contributions from third-party developers

Mark Gabel; Christopher Dean Brigham; Adam Cheyer; Joshua Levy


Archive | 2002

Design Assurance Arguments for Intrusion Tolerance

Steve Dawson; Joshua Levy; Bob Riemenschneider; Hassen Saı̈di; Victoria Stavridou; Alfonso Valdes


SemWiki | 2006

A Collaborative Programming Environment for Web Interoperability.

Adam Cheyer; Joshua Levy


Archive | 2003

Intrusion Tolerance and Worm Spread

E. Uribe; Steven Cheung; Joshua Levy; Alfonso Valdes

Collaboration


Dive into the Joshua Levy's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Magnus Almgren

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Magnus Almgren

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Yves Deswarte

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge