One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper, we present a study with operating system’s (OS’s) vulnerability data from the NIST National Vulnerability Database (NVD). We have analyzed the vulnerabilities of 11 different OSs over a period of 18 years, to check how many of these vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OSs. Hence, althou...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Diverse layers of defence play an important role in the design of defence-in-depth architectures. Th...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
The security gains of intrusion-tolerant systems are directly dependent on the assumption that syste...
This paper analyses security problems of modern computer systems caused by vulnerabilities in their ...
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattai...
The goal of this research was to explore first principles associated with mixing of diverse implemen...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
Over the past 20 years, there have been indisputable advances on the development of Byzantine Fault-...
This paper presents research on computer security vulnerabilities in general-purpose network operati...
Defence-in-depth is a term often used in security literature to denote architectures in which multip...
Early experiments with software diversity in the mid 1970s investigated N-version programming and re...
Nowadays many operating systems are including security features in order to prevent network attacks,...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Diverse layers of defence play an important role in the design of defence-in-depth architectures. Th...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
The security gains of intrusion-tolerant systems are directly dependent on the assumption that syste...
This paper analyses security problems of modern computer systems caused by vulnerabilities in their ...
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattai...
The goal of this research was to explore first principles associated with mixing of diverse implemen...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
Over the past 20 years, there have been indisputable advances on the development of Byzantine Fault-...
This paper presents research on computer security vulnerabilities in general-purpose network operati...
Defence-in-depth is a term often used in security literature to denote architectures in which multip...
Early experiments with software diversity in the mid 1970s investigated N-version programming and re...
Nowadays many operating systems are including security features in order to prevent network attacks,...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Diverse layers of defence play an important role in the design of defence-in-depth architectures. Th...