Intrusion-tolerant enclaves

被引:10
|
作者
Dutertre, B [1 ]
Crettaz, V [1 ]
Stavridou, V [1 ]
机构
[1] SRI Int, Syst Design Lab, Menlo Pk, CA 94025 USA
关键词
D O I
10.1109/SECPRI.2002.1004373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite our best efforts, any sufficiently complex computer system has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be able to penetrate the system. Intrusion tolerance attempts to maintain acceptable service despite such intrusions. This paper presents an application of intrusion-tolerance concepts to Enclaves, a software infrastructure for supporting secure group applications. Intrusion tolerance is achieved via a combination of Byzantine fault-tolerant protocols and secret sharing techniques.
引用
收藏
页码:216 / 224
页数:9
相关论文
共 50 条
  • [21] BackupIT: An Intrusion-Tolerant Cooperative Backup System
    Loest, Sergio
    Madruga, Marcelo
    Maziero, Carlos
    Lung, Lau
    [J]. PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 724 - +
  • [22] Probabilistic validation of an intrusion-tolerant replication system
    Singh, S
    Cukier, M
    Sanders, WH
    [J]. 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 615 - 624
  • [23] DiveInto: Supporting Diversity in Intrusion-Tolerant Systems
    Antunes, Joao
    Neves, Nuno
    [J]. 2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 137 - 146
  • [24] On the effects of finite memory on intrusion-tolerant systems
    Veronese, Giuliana Santos
    Correia, Miguel
    Lung, Lau Cheuk
    Verissimo, Paulo
    [J]. 13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 401 - 404
  • [25] On the correctness of an intrusion-tolerant group communication protocol
    Layouni, M
    Hooman, J
    Tahar, S
    [J]. CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 231 - 246
  • [26] Intrusion-Tolerant Server Architecture for Survivable Services
    Byoung Min Joon
    [J]. The Journal of Supercomputing, 2005, 33 (1) : 93 - 102
  • [27] Survivable SCADA Via Intrusion-Tolerant Replication
    Kirsch, Jonathan
    Goose, Stuart
    Amir, Yair
    Wei, Dong
    Skare, Paul
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (01) : 60 - 70
  • [28] Intrusion-tolerant middleware -: The road to automatic security
    Verissimo, Paulo E.
    Neves, Nuno F.
    Cachin, Christian
    Poritz, Jonathan
    Powell, David
    Deswarte, Yves
    Stroud, Robert
    Welch, Ian
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (04) : 54 - 62
  • [29] An approach for availability evaluation of intrusion-tolerant server architectures
    Shi, Tingjun
    Zhao, Jinfeng
    Sang, Xia
    Yin, Xinchun
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
  • [30] Formal verification of an intrusion-tolerant group membership protocol
    Ramasamy, HV
    Cukier, M
    Sanders, WH
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (12): : 2612 - 2622