Results 1 - 10
of
961
A Model of Secretless Security in N-Variant Systems
"... The N-variant architecture combines redundancy and diversity to provide secretless security for a computer system. In this paper, we present a new model of N-variant systems. This model generalizes previous work and establishes constructive guidelines for future N-variant systems. Our model characte ..."
Abstract
- Add to MetaCart
The N-variant architecture combines redundancy and diversity to provide secretless security for a computer system. In this paper, we present a new model of N-variant systems. This model generalizes previous work and establishes constructive guidelines for future N-variant systems. Our model
N-variant systems: A secretless framework for security through diversity
- In Proceedings of the 15th USENIX Security Symposium
, 2006
"... We present an architectural framework for systematically using automated diversity to provide high assurance detection and disruption for large classes of attacks. The framework executes a set of automatically diversified variants on the same inputs, and monitors their behavior to detect divergences ..."
Abstract
-
Cited by 121 (3 self)
- Add to MetaCart
approaches that use automated diversity for security, our approach does not rely on keeping any secrets. In this paper, we introduce the N-variant systems framework, present a model for analyzing security properties of N-variant systems, define variations that can be used to detect attacks that involve
Polygraphing Processes: N-Variant System Structures for Secretless Security
"... Authors removed for anonymity requirements We describe a technique for hardening services that may contain unknown security vulnerabilities. We employ artificial diversity techniques, but in contrast to previous approaches that rely on keeping secrets to provide probabilistic security properties, we ..."
Abstract
- Add to MetaCart
with disjoint exploitation sets, we can make it impossible to successfully carry out large classes of important attacks. In this paper, we present the N-variant systems framework, introduce a model for analyzing security properties of N-variant systems, identify two useful variations and their security
N-variant IC design: methodology and applications
- In Design Automation Conference(DAC
, 2008
"... We propose the first method for designing N-variant sequential cir-cuits. The flexibility provided by the N-variants enables a num-ber of important tasks, including IP protection, IP metering, secu-rity, design optimization, self-adaptation and fault-tolerance. The method is based on extending the f ..."
Abstract
-
Cited by 7 (6 self)
- Add to MetaCart
is not viable. Exper-imental results on benchmark circuits demonstrate that the method can be automatically and efficiently implemented. Because of its lightweight, N-variant design is particularly well-suited for secur-ing embedded systems. As a proof-of-concept, we implement the N-variant method for content
Resilient Multi-core Systems: A Hierarchical Formal Model for N-variant Executions
- Proc. CSIIRW09, ORNL
"... This research presents a hierarchical formal model capable of providing adjustable levels of service and quality of assurance, which is especially suitable for multi-core processor systems. The multi-layered architecture supports multiple levels of fault detection, masking, and dynamic load balancin ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
of hybrid fault models allows us to consider fault types ranging from benign faults to Byzantine faults. Our framework extends recent work in N-variant systems for intrusion detection, which are demonstrated to be special cases. Furthermore, it allows the movement in a tradeoff space between (1) the levels
Security through Redundant Data Diversity
"... Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously compromise multiple variants with the same input) and tailored diversity (to make it impossible to compromise all the variants w ..."
Abstract
-
Cited by 29 (2 self)
- Add to MetaCart
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously compromise multiple variants with the same input) and tailored diversity (to make it impossible to compromise all the variants
A Hierarchical Formal Framework for Adaptive N-variant Programs in Multi-core Systems
"... Abstract—We propose a formal framework for designing and developing adaptive N-variant programs. The framework supports multiple levels of fault detection, masking, and recovery through reconfiguration. Our approach is two-fold: we introduce an Adaptive Functional Capability Model (AFCM) to define l ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
faults. Last but not least, multi-layers combined with N-variant implementations are especially suitable for multi-core systems. I.
An Adaptive N-variant Software Architecture for Multi-Core Platforms: Models and Performance Analysis
"... Abstract. This paper discusses the models and performance analysis for an adaptive software architecture, which supports multiple levels of fault detection, masking, and recovery through reconfiguration. The architecture starts with a formal requirement model defining multiple levels of functional c ..."
Abstract
- Add to MetaCart
capability and information assurance. The architecture includes a multi-layer design to implement the requirements using N-variant techniques. It also integrates a reconfiguration mechanism that uses lower layers to monitor higher layers, and if a fault is detected, it reconfigures a system to maintain
Nback working memory paradigm: A meta-analysis of normative functional neuroimaging studies
- Human Brain Mapping, PubMed
"... Abstract: One of the most popular experimental paradigms for functional neuroimaging studies of working memory has been the n-back task, in which subjects are asked to monitor the identity or location of a series of verbal or nonverbal stimuli and to indicate when the currently presented stimulus is ..."
Abstract
-
Cited by 156 (2 self)
- Add to MetaCart
is the same as the one presented n trials previously. We conducted a quantitative meta-analysis of 668 sets of activation coordinates in Talairach space reported in 24 primary studies of n-back task variants manip-ulating process (location vs. identity monitoring) and content (verbal or nonverbal) of working
Public-key cryptosystems from the worst-case shortest vector problem
, 2008
"... We construct public-key cryptosystems that are secure assuming the worst-case hardness of approximating the length of a shortest nonzero vector in an n-dimensional lattice to within a small poly(n) factor. Prior cryptosystems with worst-case connections were based either on the shortest vector probl ..."
Abstract
-
Cited by 152 (22 self)
- Add to MetaCart
We construct public-key cryptosystems that are secure assuming the worst-case hardness of approximating the length of a shortest nonzero vector in an n-dimensional lattice to within a small poly(n) factor. Prior cryptosystems with worst-case connections were based either on the shortest vector
Results 1 - 10
of
961