Secure Proactive Recovery – a Hardware Based Mission Assurance Scheme
نویسندگان
چکیده
Fault tolerance via redundancy or replication is contradictory to the notion of a limited trusted computing base. Thus, normal security techniques cannot be applied to faulttolerant systems. As a result, a multi-phased approach is employed that includes fault/threat avoidance/prevention, detection and recovery. However, a determined adversary can still defeat system security by staging an attack on the recovery phase. This paper presents a hardware-based, proactive solution that can be built into any fault-tolerant, mission-critical system to secure the recovery phase. It also presents an evaluation that validates the feasibility and efficiency claims of this solution.
منابع مشابه
A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...
متن کاملAssurance Considerations for a Highly Robust TOE
The U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness (SKPP) is undergoing evaluation. During its authoring process, new extended functional and assurance requirements were introduced to resolve assurance issues associated with TOE hardware, trusted initialization and trusted recovery. For high robustness, domain separation and self-protection a...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملData and Applications Security Workshop Report Dates : February 19 and 20 , 2009 Prepared by The University of Texas at Dallas Sponsor : The National Science Foundation Under Grant : IIS - 0748433
The Office of the Deputy Assistant Secretary of Defense (Information and Identity Assurance) has stated that “the Department of Defense's (DoD) policy, planning, and war fighting capabilities are heavily dependent on the information technology foundation provided by the Global Information Grid (GIG). However, the GIG was built for business efficiency instead of mission assurance against sophist...
متن کاملFrom Software Quality Control to Quality Assurance
This paper addresses the transformation of traditional software quality control techniques to a proactive quality assurance program within embedded systems and other mission critical software: Software plays an increasingly important role in every product and organization. The number of mission critical applications, those with a high cost of failure (air traffic control systems and other life ...
متن کامل