Intrusion-Tolerant Autonomous Driving

被引:4
|
作者
Volp, Marcus [1 ]
Esteves-Verissimo, Paulo [1 ]
机构
[1] Univ Luxembourg, Crit & Extreme Secur & Dependabil Grp CritiX SnT, L-2721 Luxembourg, Luxembourg
关键词
D O I
10.1109/ISORC.2018.00026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fully autonomous driving is one if not the killer application for the upcoming decade of real-time systems. However, in the presence of increasingly sophisticated attacks by highly skilled and well equipped adversarial teams, autonomous driving must not only guarantee timeliness and hence safety. It must also consider the dependability of the software concerning these properties while the system is facing attacks. For distributed systems, fault-and-intrusion tolerance toolboxes already offer a few solutions to tolerate partial compromise of the system behind a majority of healthy components operating in consensus. In this paper, we present a concept of an intrusion-tolerant architecture for autonomous driving. In such a scenario, predictability and recovery challenges arise from the inclusion of increasingly more complex software on increasingly less predictable hardware. We highlight how an intrusion tolerant design can help solve these issues by allowing timeliness to emerge from a majority of complex components being fast enough, often enough while preserving safety under attack through pre-computed fail safes.
引用
收藏
页码:130 / 133
页数:4
相关论文
共 50 条
  • [1] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
  • [2] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [3] Practical Intrusion-Tolerant Networks
    Obenshain, Daniel
    Tantillo, Thomas
    Babay, Amy
    Schultz, John
    Newell, Andrew
    Hoque, Md. Endadul
    Amir, Yair
    Nita-Rotaru, Cristina
    [J]. PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
  • [4] An intrusion-tolerant mechanism for intrusion detection systems
    Kuang, Liwei
    Zulkernine, Mohammad
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
  • [5] An architecture for an adaptive intrusion-tolerant server
    Valdes, A
    Almgren, M
    Cheung, S
    Deswarte, Y
    Dutertre, B
    Levy, J
    Saïdi, H
    Stavridou, V
    Uribe, TE
    [J]. SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
  • [6] Intrusion-tolerant architectures:: Concepts and design
    Veríssimo, PE
    Neves, NF
    Correia, MP
    [J]. ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
  • [7] Intrusion-tolerant group management in enclaves
    Dutertre, B
    Saïdi, H
    Stavridou, V
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
  • [8] Secure intrusion-tolerant replication on the Internet
    Cachin, C
    Poritz, JA
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
  • [9] Building intrusion-tolerant secure software
    Zhang, T
    Zhuang, XT
    Pande, S
    [J]. CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266
  • [10] An architecture for adaptive intrusion-tolerant applications
    Pal, Partha
    Rubel, Paul
    Atighetchi, Michael
    Webber, Franklin
    Sanders, William H.
    Seri, Mouna
    Ramasamy, HariGovind
    Lyons, James
    Courtney, Tod
    Agbaria, Adnan
    Cukier, Michel
    Gossett, Jeanna
    Keidar, Idit
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354