Rewriting histories: Recovering from malicious transactions

被引:54
|
作者
Liu, P [1 ]
Ammann, P
Jajodia, S
机构
[1] Univ Maryland Baltimore Cty, Dept Informat Syst, Baltimore, MD 21201 USA
[2] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
关键词
information warfare; trusted recovery; databases; security; malicious transactions; transaction histories;
D O I
10.1023/A:1008731200105
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider recovery from malicious but committed transactions. Traditional recovery mechanisms do not address this problem, except for complete rollbacks, which undo the work of good transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. We develop an algorithm that rewrites execution histories for the purpose of backing out malicious transactions. Good transactions that are affected, directly or indirectly, by malicious transactions complicate the process of backing out undesirable transactions. We show that the prefix of a rewritten history produced by the algorithm serializes exactly the set of unaffected good transactions. The suffix of the rewritten history includes special state information to describe affected good transactions as well as malicious transactions. We describe techniques that can extract additional good transactions from this latter part of a rewritten history. The latter processing saves more good transactions than is possible with a dependency-graph based approach to recovery.
引用
收藏
页码:7 / 40
页数:34
相关论文
共 50 条
  • [41] Detecting Malicious Blockchain Transactions Using Graph Neural Networks
    Jeyakumar, Samantha Tharani
    Yugarajah, Andrew Charles Eugene
    Hou, Zhe
    Muthukkumarasamy, Vallipuram
    DISTRIBUTED LEDGER TECHNOLOGY, SDLT 2023, 2024, 1975 : 55 - 71
  • [42] Women's Irony: Rewriting Feminist Rhetorical Histories
    Ruccio, Kristen
    RHETORIC REVIEW, 2017, 36 (01) : 108 - 110
  • [43] Detecting Malicious Transactions Using Fuzzy Association Rule Mining
    Singh, Indu
    Jindal, Rajni
    2016 FIFTH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (ICECCS), 2016, : 79 - 83
  • [44] Colonial Transactions. Imaginaries, Bodies, and Histories in Gabon
    Bourel, Etienne
    CAHIERS D ETUDES AFRICAINES, 2022, (245):
  • [45] Histories of authority in the African Great Lakes: trajectories and transactions
    Desrosiers, Marie-Eve
    Russell, Aidan
    AFRICA, 2020, 90 (05): : 952 - 971
  • [46] Colonial Transactions: Imaginaries, Bodies and Histories in Gabon.
    Bekale, Marc Mve
    AFRICAN STUDIES REVIEW, 2021, 64 (01) : E67 - E69
  • [47] Recovering chicano/a literary histories:: Historiography beyond borders
    Martín-Rodríguez, MM
    PMLA-PUBLICATIONS OF THE MODERN LANGUAGE ASSOCIATION OF AMERICA, 2005, 120 (03): : 796 - +
  • [48] Radiocarbon Dating and the Rewriting of Huron-Wendat Archaeological Histories
    Birch, Jennifer
    PUBLIC HISTORIAN, 2022, 44 (04): : 18 - 35
  • [49] On First-Order Query Rewriting for Incomplete Database Histories
    Bruyere, Veronique
    Decan, Alexandre
    Wijsen, Jef
    TIME 2009: 16TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2009, : 54 - 61
  • [50] Detection algorithm of malicious transactions based on transaction-profile chart
    Chen, Jin-Fu
    Lu, Yan-Sheng
    Xie, Xiao-Dong
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2008, 14 (06): : 1230 - 1235