Silent errors, or silent data corruptions, constitute a major threat on very large scale platforms. When a silent error strikes, it is not detected immediately but only after some delay, which prevents the use of pure periodic checkpointing approaches devised for fail-stop errors. Instead, checkpointing must be coupled with some verification mechanism to guarantee that corrupted data will never be written into the checkpoint file. Such a guaranteed verification mechanism typically incurs a high cost. In this paper, we investigate the use of partial verification mechanisms in addition to a guaranteed verification. The main objective is to investigate to which extent it is worthwhile to use some light-cost but less precise verification type i...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
In this paper, we revisit traditional checkpointing and rollback recovery strategies, with a focus o...
Many methods are available to detect silent errors in high-performancecomputing (HPC) applications. ...
Fail-stop and silent errors are omnipresent on large-scale platforms. Efficient resilience technique...
This paper provides a model and an analytical study of replication as a techniqueto detect and corre...
This paper provides a model and an analytical study of replication as a techniqueto detect and corre...
High performance computing applications must be resilient to faults, which are common occurrences es...
Security is a crucial requirement in the applications based on information and communication technol...
La société de l’information dans laquelle nous vivons repose notamment sur notre capacité à échanger...
In critical software systems like the ones related to transport and defense, it is common toperform ...
One has a large workload that is ``divisible''---its constituent work's granularity can be adjusted ...
We focus on High Performance Computing (HPC) workflows whose dependency graphforms a linear chain, a...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...
In this paper, we revisit traditional checkpointing and rollback recovery strategies, with a focus o...
Many methods are available to detect silent errors in high-performancecomputing (HPC) applications. ...
Fail-stop and silent errors are omnipresent on large-scale platforms. Efficient resilience technique...
This paper provides a model and an analytical study of replication as a techniqueto detect and corre...
This paper provides a model and an analytical study of replication as a techniqueto detect and corre...
High performance computing applications must be resilient to faults, which are common occurrences es...
Security is a crucial requirement in the applications based on information and communication technol...
La société de l’information dans laquelle nous vivons repose notamment sur notre capacité à échanger...
In critical software systems like the ones related to transport and defense, it is common toperform ...
One has a large workload that is ``divisible''---its constituent work's granularity can be adjusted ...
We focus on High Performance Computing (HPC) workflows whose dependency graphforms a linear chain, a...
The information society we belong to heavily relies on secure information exchanges. To exchange inf...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
With the rise of the Internet the use of cryptographic protocols became ubiquitous. Considering the ...