作者: Joshua Stella , Dominic Zippilli , Matthew Brinkman
DOI:
关键词:
摘要: Approaches for replacing software components executing in a runtime environment with corresponding known-good are disclosed. In some implementations, at least first event indicating that component the should be replaced may determined. The determined without respect to whether has been compromised or potentially compromised. At second obtained from repository is separate environment. based on such available use after and no longer event.