Abstract. This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to be corrupted. The classic problem of fault tolerance is to modify a system so that it works despite a limited number of faults. We introduce a novel variant of this problem. Instead of demanding that the system works despite faults, we simply require that it remains secure: wrong answers may be given but secrets will not be revealed. We develop a software-based technique to achieve this fault-tolerant non-interference property. The method is defined on a simple assembly language, and guarantees security for any assembly program provided as input. The security property is defi...
The problem of achieving fault-tolerant supervision of discrete-event systems is considered from the...
International audienceMost of the work that has been done to build reliable interactive systems has ...
AbstractWe introduce a method, Lightweight Privilege Separation, enabling safe execution of unreliab...
This paper is about ensuring security in unreliable systems. We studysystems which are subject to tr...
A transient hardware fault occurs when an energetic particle strikes a transistor, causing it to cha...
Environmental noise (e.g. heat, ionized particles, etc.) causes transient faults in hardware, which ...
Detectors are system components that identify whether the system is in a particular state. Detectors...
Detectors are system components that identify whether the system is in a particular state. Detectors...
In this paper, we demonstrate there exists practical limits to the recoverability and integrity veri...
Both the scale and the reach of computer systems and embedded devices have been constantly increasin...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
Fault-tolerance is an important requirement in distributed computing systems. However, designing ap...
We present a framework that facilitates synthesis and validation of fail-safe fault-tolerant program...
Dependability is that property of a computer system such that reliance can justifiably be place on t...
The techniques of formal verification are one means for gaining greater assurance of the correctness...
The problem of achieving fault-tolerant supervision of discrete-event systems is considered from the...
International audienceMost of the work that has been done to build reliable interactive systems has ...
AbstractWe introduce a method, Lightweight Privilege Separation, enabling safe execution of unreliab...
This paper is about ensuring security in unreliable systems. We studysystems which are subject to tr...
A transient hardware fault occurs when an energetic particle strikes a transistor, causing it to cha...
Environmental noise (e.g. heat, ionized particles, etc.) causes transient faults in hardware, which ...
Detectors are system components that identify whether the system is in a particular state. Detectors...
Detectors are system components that identify whether the system is in a particular state. Detectors...
In this paper, we demonstrate there exists practical limits to the recoverability and integrity veri...
Both the scale and the reach of computer systems and embedded devices have been constantly increasin...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
Fault-tolerance is an important requirement in distributed computing systems. However, designing ap...
We present a framework that facilitates synthesis and validation of fail-safe fault-tolerant program...
Dependability is that property of a computer system such that reliance can justifiably be place on t...
The techniques of formal verification are one means for gaining greater assurance of the correctness...
The problem of achieving fault-tolerant supervision of discrete-event systems is considered from the...
International audienceMost of the work that has been done to build reliable interactive systems has ...
AbstractWe introduce a method, Lightweight Privilege Separation, enabling safe execution of unreliab...