Performance modeling of moving target defenses

W Connell, DA Menascé, M Albanese - … of the 2017 Workshop on Moving …, 2017 - dl.acm.org
In recent years, Moving Target Defense (MTD) has emerged as a potential game changer in
the security landscape, due to its potential to create asymmetric uncertainty that favors the …

Towards a practical survivable intrusion tolerant replication system

M Platania, D Obenshain, T Tantillo… - 2014 IEEE 33rd …, 2014 - ieeexplore.ieee.org
The increasing number of cyber attacks against critical infrastructures, which typically
require large state and long system lifetimes, necessitates the design of systems that are …

A cyber-resilient architecture for critical security services

D Kreutz, O Malichevskyy, E Feitosa, H Cunha… - Journal of Network and …, 2016 - Elsevier
Authentication and authorization are two of the most important services for any IT
infrastructure. Taking into account the current state of affairs of cyber warfare, the security …

A heterogeneous redundant architecture for industrial control system security

Z Dai, M Leeke, Y Ding, S Yang - 2022 IEEE 27th Pacific Rim …, 2022 - ieeexplore.ieee.org
Component-level heterogeneous redundancy is gaining popularity as an approach for
preventing single-point security breaches in Industrial Control Systems (ICSs), especially …

Models of reliability of fault-tolerant software under cyber-attacks

P Popov - 2017 IEEE 28th International Symposium on …, 2017 - ieeexplore.ieee.org
This paper offers a new approach to modelling the effect of cyber-attacks on reliability of
software used in industrial control applications. The model is based on the view that …

On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions

L Teixeira d'Aguiar Norton Brandão… - Journal of the Brazilian …, 2012 - Springer
This paper considers the estimation of reliability and availability of intrusion-tolerant systems
subject to non-detectable intrusions caused by stealth attacks. We observe that typical …

Improving security for time-triggered real-time systems with task replication

K Krüger, G Fohler, M Völp… - 2018 IEEE 24th …, 2018 - ieeexplore.ieee.org
Time-triggered real-time systems achieve deterministic behaviour, making them suitable for
safety-critical environments. However, this determinism also allows attackers to finetune …

Randomization as mitigation of directed timing inference based attacks on time-triggered real-time systems with task replication

K Krüger, N Vreman, R Pates, M Maggio, M Völp… - 2021 - drops.dagstuhl.de
Time-triggered real-time systems achieve deterministic behavior using schedules that are
constructed offline, based on scheduling constraints. Their deterministic behavior makes …

Towards Standardization of Threshold Schemes at NIST

LTAN Brandão - Proceedings of ACM Workshop on Theory of …, 2019 - dl.acm.org
The Computer Security Division at the National Institute of Standards and Technology (NIST)
is taking steps towards the standardization of threshold schemes for cryptographic …

[图书][B] Practical and Secure Architectures Using Ephemeral Cloud Environments

I Polinsky - 2023 - search.proquest.com
Web services are a core component behind many of our daily tasks. The ability for
developers to create applications that are accessible from a range of devices across the …