2022
DOI: 10.1016/j.cose.2022.102920
|View full text |Cite
|
Sign up to set email alerts
|

Behind the last line of defense: Surviving SoC faults and intrusions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Indeed, FIT protocols are commonly known to be computationally demanding due to (1) quadratic (O(n 2 )) number of exchange of messages between the replicas for reaching the consensus, and (2) the extensive use of cryptography. However, with the advent of powerful hardware-based components, that allowed the use of trusted-trustworthy abstractions (i.e., hybrids) [6], [7], cryptography computation is becoming more efficient, and the spatial complexity can be reduced to N = 2f + 1, eventually requiring fairly simpler message exchange between replicas [7], [20]. Consequently, FIT is being increasingly explored and studied in multi-core on chip embedded systems as we do here.…”
Section: Feasibility Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, FIT protocols are commonly known to be computationally demanding due to (1) quadratic (O(n 2 )) number of exchange of messages between the replicas for reaching the consensus, and (2) the extensive use of cryptography. However, with the advent of powerful hardware-based components, that allowed the use of trusted-trustworthy abstractions (i.e., hybrids) [6], [7], cryptography computation is becoming more efficient, and the spatial complexity can be reduced to N = 2f + 1, eventually requiring fairly simpler message exchange between replicas [7], [20]. Consequently, FIT is being increasingly explored and studied in multi-core on chip embedded systems as we do here.…”
Section: Feasibility Discussionmentioning
confidence: 99%
“…To circumvent the intrusion detection inefficiency, a recent approach is to use intrusion masking [19], [20], inspired from state-machine-replication (SMR) [21] in Distributed Computing. To tolerate up to t malicious or anomalous replicas, intrusion masking requires running a number (n) of concurrent replicas of a process, thus forming a replicated state machine, running on multiple processing cores in this case.…”
Section: Introductionmentioning
confidence: 99%
“…We assume for a deployed system that the containers of critical components (such as control) will be hosted directly on top of a real-time operating system (RTOS) that is capable of offering the required isolation. Of course, the RTOS in such architectures forms a single point of failure, which must be addressed in future [e.g., as demonstrated in the Midir architecture (Gouveia et al, 2022)].…”
Section: Implementationmentioning
confidence: 99%
“…Kozachok A.V. 7 , Spirin A.A. 8 , Erokhina N.S. 9 Purpose of the work is to develop of a method for input data generation for fuzzing testing of JavaScript engines and its evaluation.…”
mentioning
confidence: 99%