Intrusion-tolerant enclaves

被引:10
|
作者
Dutertre, B [1 ]
Crettaz, V [1 ]
Stavridou, V [1 ]
机构
[1] SRI Int, Syst Design Lab, Menlo Pk, CA 94025 USA
关键词
D O I
10.1109/SECPRI.2002.1004373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite our best efforts, any sufficiently complex computer system has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be able to penetrate the system. Intrusion tolerance attempts to maintain acceptable service despite such intrusions. This paper presents an application of intrusion-tolerance concepts to Enclaves, a software infrastructure for supporting secure group applications. Intrusion tolerance is achieved via a combination of Byzantine fault-tolerant protocols and secret sharing techniques.
引用
收藏
页码:216 / 224
页数:9
相关论文
共 50 条
  • [1] Intrusion-tolerant group management in enclaves
    Dutertre, B
    Saïdi, H
    Stavridou, V
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
  • [2] Intrusion-tolerant group management in enclaves -: (Transcript of discussion)
    Saïdi, H
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 213 - 216
  • [3] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [4] Intrusion-Tolerant Autonomous Driving
    Volp, Marcus
    Esteves-Verissimo, Paulo
    [J]. 2018 IEEE 21ST INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2018), 2018, : 130 - 133
  • [5] Practical Intrusion-Tolerant Networks
    Obenshain, Daniel
    Tantillo, Thomas
    Babay, Amy
    Schultz, John
    Newell, Andrew
    Hoque, Md. Endadul
    Amir, Yair
    Nita-Rotaru, Cristina
    [J]. PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
  • [6] An intrusion-tolerant mechanism for intrusion detection systems
    Kuang, Liwei
    Zulkernine, Mohammad
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
  • [7] An architecture for an adaptive intrusion-tolerant server
    Valdes, A
    Almgren, M
    Cheung, S
    Deswarte, Y
    Dutertre, B
    Levy, J
    Saïdi, H
    Stavridou, V
    Uribe, TE
    [J]. SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
  • [8] Intrusion-tolerant architectures:: Concepts and design
    Veríssimo, PE
    Neves, NF
    Correia, MP
    [J]. ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
  • [9] Secure intrusion-tolerant replication on the Internet
    Cachin, C
    Poritz, JA
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
  • [10] Building intrusion-tolerant secure software
    Zhang, T
    Zhuang, XT
    Pande, S
    [J]. CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266