2003
DOI: 10.1016/s1383-7621(02)00137-6
|View full text |Cite
|
Sign up to set email alerts
|

Secure checkpointing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Secure checkpointing schemes [75] generally leverage cryptography to protect the integrity and confidentiality of checkpoint data at rest. However they generally do not consider attacks that may tamper with checkpointing code at the application level.…”
Section: Checkpoint and Restorementioning
confidence: 99%
See 1 more Smart Citation
“…Secure checkpointing schemes [75] generally leverage cryptography to protect the integrity and confidentiality of checkpoint data at rest. However they generally do not consider attacks that may tamper with checkpointing code at the application level.…”
Section: Checkpoint and Restorementioning
confidence: 99%
“…Existing approaches to checkpoint & restore, such as CRIU [52] provide support for process snapshots that can enable rollback-like functionality. However, checkpoint & restore generally suffers from high overheads due to relying on reproducing process memory and do not consider in-memory attacks in their threat models [64,75,109,114,117]. SDRoB avoids these drawbacks by combining in-process isolation to limit the scope of attacks and to ensure the integrity of memory after rollback.…”
Section: Related Workmentioning
confidence: 99%
“…The choice of the hash function impacts the correctness, since many hash functions present a significant probability of collisions, that is, situations where two different memory blocks are assigned the same hash value. In order to achieve reliable operation, secure hash functions should be used 26) . The implementation in CPPC allows the user to choose between different secure hash functions, such as MD5 or SHA.…”
Section: Incremental Checkpointing and Zero-blocks Exclusionmentioning
confidence: 99%
“…The network is one of the common places where security threats exist [5] [6]. In this algorithm each mobile host encrypts checkpoint and saves in base station.…”
Section: Introductionmentioning
confidence: 99%