Secure Proactive Recovery – a Hardware Based Mission Assurance Scheme

نویسندگان

  • Ruchika Mehresh
  • Shambhu J. Upadhyaya
  • Kevin Kwiat
چکیده

Fault tolerance via redundancy or replication is contradictory to the notion of a limited trusted computing base. Thus, normal security techniques cannot be applied to faulttolerant systems. As a result, a multi-phased approach is employed that includes fault/threat avoidance/prevention, detection and recovery. However, a determined adversary can still defeat system security by staging an attack on the recovery phase. This paper presents a hardware-based, proactive solution that can be built into any fault-tolerant, mission-critical system to secure the recovery phase. It also presents an evaluation that validates the feasibility and efficiency claims of this solution.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering

In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...

متن کامل

Assurance Considerations for a Highly Robust TOE

The U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness (SKPP) is undergoing evaluation. During its authoring process, new extended functional and assurance requirements were introduced to resolve assurance issues associated with TOE hardware, trusted initialization and trusted recovery. For high robustness, domain separation and self-protection a...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Data and Applications Security Workshop Report Dates : February 19 and 20 , 2009 Prepared by The University of Texas at Dallas Sponsor : The National Science Foundation Under Grant : IIS - 0748433

The Office of the Deputy Assistant Secretary of Defense (Information and Identity Assurance) has stated that “the Department of Defense's (DoD) policy, planning, and war fighting capabilities are heavily dependent on the information technology foundation provided by the Global Information Grid (GIG). However, the GIG was built for business efficiency instead of mission assurance against sophist...

متن کامل

From Software Quality Control to Quality Assurance

This paper addresses the transformation of traditional software quality control techniques to a proactive quality assurance program within embedded systems and other mission critical software: Software plays an increasingly important role in every product and organization. The number of mission critical applications, those with a high cost of failure (air traffic control systems and other life ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012