This paper is about ensuring security in unreliable systems. We studysystems which are subject to transient faults – soft errors that cause stored valuesto be corrupted. The classic problem of fault tolerance is to modify a system sothat it works despite a limited number of faults. We introduce a novel variantof this problem. Instead of demanding that the system works despite faults, wesimply require that it remains secure: wrong answers may be given but secretswill not be revealed. We develop a software-based technique to achieve this fault tolerantnon-interference property. The method is defined on a simple assemblylanguage, and guarantees security for any assembly program provided as input.The security property is defined on top of a for...
Abstract: An important and recurring security scenario involves the need to carry out trusted comput...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
International audienceMost of the work that has been done to build reliable interactive systems has ...
This paper is about ensuring security in unreliable systems. We study systems which are subject to t...
Abstract. This paper is about ensuring security in unreliable systems. We study systems which are su...
A transient hardware fault occurs when an energetic particle strikes a transistor, causing it to cha...
Environmental noise (e.g. heat, ionized particles, etc.) causes transient faults in hardware, which ...
Detectors are system components that identify whether the system is in a particular state. Detectors...
Detectors are system components that identify whether the system is in a particular state. Detectors...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
Both the scale and the reach of computer systems and embedded devices have been constantly increasin...
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture,...
In this paper, we demonstrate there exists practical limits to the recoverability and integrity veri...
Fault-tolerance is an important requirement in distributed computing systems. However, designing ap...
We present a framework that facilitates synthesis and validation of fail-safe fault-tolerant program...
Abstract: An important and recurring security scenario involves the need to carry out trusted comput...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
International audienceMost of the work that has been done to build reliable interactive systems has ...
This paper is about ensuring security in unreliable systems. We study systems which are subject to t...
Abstract. This paper is about ensuring security in unreliable systems. We study systems which are su...
A transient hardware fault occurs when an energetic particle strikes a transistor, causing it to cha...
Environmental noise (e.g. heat, ionized particles, etc.) causes transient faults in hardware, which ...
Detectors are system components that identify whether the system is in a particular state. Detectors...
Detectors are system components that identify whether the system is in a particular state. Detectors...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
Both the scale and the reach of computer systems and embedded devices have been constantly increasin...
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture,...
In this paper, we demonstrate there exists practical limits to the recoverability and integrity veri...
Fault-tolerance is an important requirement in distributed computing systems. However, designing ap...
We present a framework that facilitates synthesis and validation of fail-safe fault-tolerant program...
Abstract: An important and recurring security scenario involves the need to carry out trusted comput...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
International audienceMost of the work that has been done to build reliable interactive systems has ...