Sciweavers

DSN
2011
IEEE
13 years 6 days ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...
SP
2002
IEEE
121views Security Privacy» more  SP 2002»
14 years 2 days ago
Intrusion-Tolerant Enclaves
Despite our best efforts, any sufficiently complex computer system has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be ab...
Bruno Dutertre, Valentin Crettaz, Victoria Stavrid...
JNW
2006
142views more  JNW 2006»
14 years 12 days ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
ESORICS
2006
Springer
14 years 4 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
CCGRID
2006
IEEE
14 years 6 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood
NCA
2009
IEEE
14 years 7 months ago
From Auto-adaptive to Survivable and Self-Regenerative Systems
—This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and usercontrolled reactive adaptation to highly sophisticated autonomic a...
Michael Atighetchi, Partha Pratim Pal