2014 IEEE 33rd International Symposium on Reliable Distributed Systems 2014
DOI: 10.1109/srds.2014.16
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Practical Survivable Intrusion Tolerant Replication System

Abstract: Abstract-The increasing number of cyber attacks against critical infrastructures, which typically require large state and long system lifetimes, necessitates the design of systems that are able to work correctly even if part of them is compromised.We present the first practical survivable intrusion tolerant replication system, which defends across space and time using compiler-based diversity and proactive recovery, respectively. Our system supports large-state applications, and utilizes the Prime BFT protocol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 20 publications
0
5
0
2
Order By: Relevance
“…The proponents of "proactive recovery", e.g. [1] [6], [16] and [18], would argue that it is, while some may argue that such practice may in fact reduce dependability. Indeed, the benefits, of cleansing are questionable: an advanced persistent threat (APT) that has successfully compromised a piece of software once is likely to persist and likely to compromise it again and again, probably taking increasingly shorter time to compromise a replica after cleansing.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The proponents of "proactive recovery", e.g. [1] [6], [16] and [18], would argue that it is, while some may argue that such practice may in fact reduce dependability. Indeed, the benefits, of cleansing are questionable: an advanced persistent threat (APT) that has successfully compromised a piece of software once is likely to persist and likely to compromise it again and again, probably taking increasingly shorter time to compromise a replica after cleansing.…”
Section: Resultsmentioning
confidence: 99%
“…• We limited our work to the simplest fault-tolerant architecture -the 1-out-of-2 software -but referred several times to systems of significantly higher complexity such intrusion-tolerant architectures based on Byzantine agreement protocol [1,16,18]. The proposed style of modelling seems applicable to such systems, too.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [144], the authors present a survivable intrusion-tolerant replication model, that ensures the reliability across diverse system components and the resilience of the system over its lifetime. The model was evaluated through experiments involving both physical and virtualized environments.…”
Section: Scada Survivability and Resiliencementioning
confidence: 99%
“…However, real-world software diversity is often employed in an ad hoc fashion, which can be justified by how different OSes (e.g., Windows vs. various kinds of Unix) and browsers (e.g., Safari vs. Firefox vs. Chrome) are employed in practice. One exception is the investigation of employing software diversity to enhance Byzantine Fault-Tolerance (BFT), namely how to employ software diversity in the replica implementations so that they do not contain common vulnerabilities [23], [24], [25], [26], [27], [28]. This is important because the theoretical fault-tolerance guarantee can be ruined otherwise.…”
Section: Introductionmentioning
confidence: 99%