Abstract We describe Citadel, our vision of multi-layered defensivearchitectures that will augment existing computer systems and networks, enhancing their survivability in face offailures or attacks. The core of our defensive architecture is the Backdoor, a trusted programmable network interfaceplaced on the I/O bus of a computer system that can access local resources (memory, I/O devices) and can initiatesecure remote operations on other remote backdoors. The main function of a backdoor is to provide a last line ofdefense for its host system, even when the host OS is not available or cannot be trusted. Depending on theparticular architecture, backdoors can be programmed to execute defensive activities alone or in cooperation withother back...
Ransomware has become a global problem, striking almost every sector that uses computers, from indus...
Systems security is becoming more challenging in the face of untrusted programs and system users. Sa...
The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ...
Computing systems are complex machines comprised of many disparate components working together to fu...
Abstract: As both the number and the complexity of cyber-attacks continuously increase, it is becomi...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Presented on January 29, 2016 at 12:00 in the Scheller College of Business, room 102, Georgia Tech.B...
The article of record as published may be located at http://dx.doi.org//10.1287/inte.1060.0252We des...
Survivability refers to the capability of a system to ful ll its mission, in a timely manner, in the...
Abstract It is fundamentally challenging to build a secure system atop the current computer architec...
Many types and methodologies of attacks have been developed in order to target the victims in differ...
Speaking publicly about infrastructure threats for the first time, Director of the CIA, George Tenet...
Abstract We describe new bilevel programming models to (1) help make the country’s criti-cal infrast...
Networked computer systems underlie a great deal of business, social, and government activity today....
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Ransomware has become a global problem, striking almost every sector that uses computers, from indus...
Systems security is becoming more challenging in the face of untrusted programs and system users. Sa...
The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ...
Computing systems are complex machines comprised of many disparate components working together to fu...
Abstract: As both the number and the complexity of cyber-attacks continuously increase, it is becomi...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Presented on January 29, 2016 at 12:00 in the Scheller College of Business, room 102, Georgia Tech.B...
The article of record as published may be located at http://dx.doi.org//10.1287/inte.1060.0252We des...
Survivability refers to the capability of a system to ful ll its mission, in a timely manner, in the...
Abstract It is fundamentally challenging to build a secure system atop the current computer architec...
Many types and methodologies of attacks have been developed in order to target the victims in differ...
Speaking publicly about infrastructure threats for the first time, Director of the CIA, George Tenet...
Abstract We describe new bilevel programming models to (1) help make the country’s criti-cal infrast...
Networked computer systems underlie a great deal of business, social, and government activity today....
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Ransomware has become a global problem, striking almost every sector that uses computers, from indus...
Systems security is becoming more challenging in the face of untrusted programs and system users. Sa...
The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ...