Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleDecember 2012
Proactive Recovery in Intrusion-Tolerant System Based on TTCB
ICCECT '12: Proceedings of the 2012 International Conference on Control Engineering and Communication TechnologyPages 799–802https://doi.org/10.1109/ICCECT.2012.210This paper proposes two proactive recovery mechanisms, i.e., periodic grouped proactive recovery and annular proactive recovery. The periodic grouped proactive recovery divides the replicas into groups and each group recover periodically in round. The ...
- research-articleJuly 2010
Proactive obfuscation
ACM Transactions on Computer Systems (TOCS), Volume 28, Issue 2Article No.: 4, Pages 1–54https://doi.org/10.1145/1813654.1813655Proactive obfuscation is a new method for creating server replicas that are likely to have fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate diverse executables, periodically restarting servers with these fresh ...
- research-articleApril 2010
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 21, Issue 4Pages 452–465https://doi.org/10.1109/TPDS.2009.83In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as recoveries are faster than an upper bound on fault production assumed at ...
- research-articleDecember 2008
FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery
- Alysson Bessani,
- Hans P. Reiser,
- Paulo Sousa,
- Ilir Gashi,
- Vladimir Stankovic,
- Tobias Distler,
- Rüdiger Kapitza,
- Alessandro Daidone,
- Rafael Obelheiro
Companion '08: Proceedings of the ACM/IFIP/USENIX Middleware '08 Conference CompanionPages 99–101https://doi.org/10.1145/1462735.1462763The goal of the FOREVER project is to develop a service for Fault/intrusiOn REmoVal through Evolution & Recovery. In order to achieve this goal, our work addresses three main tasks: the definition of the FOREVER service architecture; the analysis of how ...
- research-articleApril 2008
Efficient state transfer for hypervisor-based proactive recovery
WRAITS '08: Proceedings of the 2nd workshop on Recent advances on intrusiton-tolerant systemsArticle No.: 4, Pages 1–6https://doi.org/10.1145/1413901.1413905Proactive recovery of replicated services is a novel approach that allows tolerating a potentially unlimited number of malicious faults during system lifetime by periodically restarting replicas from a correct state. Recovering a stateful replica ...
- research-articleJanuary 2008
Loss Recovery in Application-Layer Multicast
Application-layer multicast, sometimes called overlay multicast, can help circumvent the limitations in IP multicast and unicast.
- ArticleApril 2006
Proactive resilience through architectural hybridization
SAC '06: Proceedings of the 2006 ACM symposium on Applied computingPages 686–690https://doi.org/10.1145/1141277.1141435In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusion-tolerant system under the asynchronous model. This result follows from the fact that in an asynchronous environment one cannot ...
- articleAugust 2003
BASE: Using abstraction to improve fault tolerance
ACM Transactions on Computer Systems (TOCS), Volume 21, Issue 3Pages 236–269https://doi.org/10.1145/859716.859718Software errors are a major cause of outages and they are increasingly exploited in malicious attacks. Byzantine fault tolerance allows replicated systems to mask some software errors but it is expensive to deploy. This paper describes a replication ...
- articleNovember 2002
Practical byzantine fault tolerance and proactive recovery
ACM Transactions on Computer Systems (TOCS), Volume 20, Issue 4Pages 398–461https://doi.org/10.1145/571637.571640Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions ...