• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 961
Next 10 →

A Model of Secretless Security in N-Variant Systems

by Eric Weatherwax, John Knight, Anh Nguyen-tuong
"... The N-variant architecture combines redundancy and diversity to provide secretless security for a computer system. In this paper, we present a new model of N-variant systems. This model generalizes previous work and establishes constructive guidelines for future N-variant systems. Our model characte ..."
Abstract - Add to MetaCart
The N-variant architecture combines redundancy and diversity to provide secretless security for a computer system. In this paper, we present a new model of N-variant systems. This model generalizes previous work and establishes constructive guidelines for future N-variant systems. Our model

N-variant systems: A secretless framework for security through diversity

by Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-tuong, Jason Hiser - In Proceedings of the 15th USENIX Security Symposium , 2006
"... We present an architectural framework for systematically using automated diversity to provide high assurance detection and disruption for large classes of attacks. The framework executes a set of automatically diversified variants on the same inputs, and monitors their behavior to detect divergences ..."
Abstract - Cited by 121 (3 self) - Add to MetaCart
approaches that use automated diversity for security, our approach does not rely on keeping any secrets. In this paper, we introduce the N-variant systems framework, present a model for analyzing security properties of N-variant systems, define variations that can be used to detect attacks that involve

Polygraphing Processes: N-Variant System Structures for Secretless Security

by unknown authors
"... Authors removed for anonymity requirements We describe a technique for hardening services that may contain unknown security vulnerabilities. We employ artificial diversity techniques, but in contrast to previous approaches that rely on keeping secrets to provide probabilistic security properties, we ..."
Abstract - Add to MetaCart
with disjoint exploitation sets, we can make it impossible to successfully carry out large classes of important attacks. In this paper, we present the N-variant systems framework, introduce a model for analyzing security properties of N-variant systems, identify two useful variations and their security

N-variant IC design: methodology and applications

by Yousra Alkabani, Farinaz Koushanfar - In Design Automation Conference(DAC , 2008
"... We propose the first method for designing N-variant sequential cir-cuits. The flexibility provided by the N-variants enables a num-ber of important tasks, including IP protection, IP metering, secu-rity, design optimization, self-adaptation and fault-tolerance. The method is based on extending the f ..."
Abstract - Cited by 7 (6 self) - Add to MetaCart
is not viable. Exper-imental results on benchmark circuits demonstrate that the method can be automatically and efficiently implemented. Because of its lightweight, N-variant design is particularly well-suited for secur-ing embedded systems. As a proof-of-concept, we implement the N-variant method for content

Resilient Multi-core Systems: A Hierarchical Formal Model for N-variant Executions

by Axel Krings, Li Tan, Clinton Jeffery, Robert Rinker - Proc. CSIIRW09, ORNL
"... This research presents a hierarchical formal model capable of providing adjustable levels of service and quality of assurance, which is especially suitable for multi-core processor systems. The multi-layered architecture supports multiple levels of fault detection, masking, and dynamic load balancin ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
of hybrid fault models allows us to consider fault types ranging from benign faults to Byzantine faults. Our framework extends recent work in N-variant systems for intrusion detection, which are demonstrated to be special cases. Furthermore, it allows the movement in a tradeoff space between (1) the levels

Security through Redundant Data Diversity

by Anh Nguyen-tuong, David Evans, John C. Knight, Benjamin Cox, Jack W. Davidson
"... Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously compromise multiple variants with the same input) and tailored diversity (to make it impossible to compromise all the variants w ..."
Abstract - Cited by 29 (2 self) - Add to MetaCart
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously compromise multiple variants with the same input) and tailored diversity (to make it impossible to compromise all the variants

A Hierarchical Formal Framework for Adaptive N-variant Programs in Multi-core Systems

by Li Tan, Axel Krings
"... Abstract—We propose a formal framework for designing and developing adaptive N-variant programs. The framework supports multiple levels of fault detection, masking, and recovery through reconfiguration. Our approach is two-fold: we introduce an Adaptive Functional Capability Model (AFCM) to define l ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
faults. Last but not least, multi-layers combined with N-variant implementations are especially suitable for multi-core systems. I.

An Adaptive N-variant Software Architecture for Multi-Core Platforms: Models and Performance Analysis

by Li Tan, Axel Krings
"... Abstract. This paper discusses the models and performance analysis for an adaptive software architecture, which supports multiple levels of fault detection, masking, and recovery through reconfiguration. The architecture starts with a formal requirement model defining multiple levels of functional c ..."
Abstract - Add to MetaCart
capability and information assurance. The architecture includes a multi-layer design to implement the requirements using N-variant techniques. It also integrates a reconfiguration mechanism that uses lower layers to monitor higher layers, and if a fault is detected, it reconfigures a system to maintain

Nback working memory paradigm: A meta-analysis of normative functional neuroimaging studies

by Adrian M. Owen, Kathryn M. Mcmillan, Angela R. Laird, Bullmore - Human Brain Mapping, PubMed
"... Abstract: One of the most popular experimental paradigms for functional neuroimaging studies of working memory has been the n-back task, in which subjects are asked to monitor the identity or location of a series of verbal or nonverbal stimuli and to indicate when the currently presented stimulus is ..."
Abstract - Cited by 156 (2 self) - Add to MetaCart
is the same as the one presented n trials previously. We conducted a quantitative meta-analysis of 668 sets of activation coordinates in Talairach space reported in 24 primary studies of n-back task variants manip-ulating process (location vs. identity monitoring) and content (verbal or nonverbal) of working

Public-key cryptosystems from the worst-case shortest vector problem

by Chris Peikert , 2008
"... We construct public-key cryptosystems that are secure assuming the worst-case hardness of approximating the length of a shortest nonzero vector in an n-dimensional lattice to within a small poly(n) factor. Prior cryptosystems with worst-case connections were based either on the shortest vector probl ..."
Abstract - Cited by 152 (22 self) - Add to MetaCart
We construct public-key cryptosystems that are secure assuming the worst-case hardness of approximating the length of a shortest nonzero vector in an n-dimensional lattice to within a small poly(n) factor. Prior cryptosystems with worst-case connections were based either on the shortest vector
Next 10 →
Results 1 - 10 of 961
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University