This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to be corrupted. The classic problem of fault tolerance is to modify a system so that it works despite a limited number of faults. We introduce a novel variant of this problem. Instead of demanding that the system works despite faults, we simply require that it remains secure: wrong answers may be given but secrets will not be revealed. We develop a software-based technique to achieve this fault tolerant non-interference property. The method is defined on a simple assembly language, and guarantees security for any assembly program provided as input. The security property is defined on top...
This paper investigates the complexity of adding nonmasking fault tolerance, where a nonmasking faul...
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture,...
Dependability is that property of a computer system such that reliance can justifiably be place on t...
This paper is about ensuring security in unreliable systems. We studysystems which are subject to tr...
Abstract. This paper is about ensuring security in unreliable systems. We study systems which are su...
A transient hardware fault occurs when an energetic particle strikes a transistor, causing it to cha...
Environmental noise (e.g. heat, ionized particles, etc.) causes transient faults in hardware, which ...
Detectors are system components that identify whether the system is in a particular state. Detectors...
Detectors are system components that identify whether the system is in a particular state. Detectors...
Both the scale and the reach of computer systems and embedded devices have been constantly increasin...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
In this paper, we demonstrate there exists practical limits to the recoverability and integrity veri...
We present a framework that facilitates synthesis and validation of fail-safe fault-tolerant program...
Fault-tolerance is an important requirement in distributed computing systems. However, designing ap...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
This paper investigates the complexity of adding nonmasking fault tolerance, where a nonmasking faul...
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture,...
Dependability is that property of a computer system such that reliance can justifiably be place on t...
This paper is about ensuring security in unreliable systems. We studysystems which are subject to tr...
Abstract. This paper is about ensuring security in unreliable systems. We study systems which are su...
A transient hardware fault occurs when an energetic particle strikes a transistor, causing it to cha...
Environmental noise (e.g. heat, ionized particles, etc.) causes transient faults in hardware, which ...
Detectors are system components that identify whether the system is in a particular state. Detectors...
Detectors are system components that identify whether the system is in a particular state. Detectors...
Both the scale and the reach of computer systems and embedded devices have been constantly increasin...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
In this paper, we demonstrate there exists practical limits to the recoverability and integrity veri...
We present a framework that facilitates synthesis and validation of fail-safe fault-tolerant program...
Fault-tolerance is an important requirement in distributed computing systems. However, designing ap...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
This paper investigates the complexity of adding nonmasking fault tolerance, where a nonmasking faul...
Abstract. Non-interference is a desirable property of systems in a multilevel security architecture,...
Dependability is that property of a computer system such that reliance can justifiably be place on t...