Fault-Tolerant Non-interference
This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to be corrupted. The classic problem of fault tolerance is to modify a system so that it works despite a limited number of faults. We introduce a...
Saved in:
Published in | Engineering Secure Software and Systems Vol. 8364 LNCS; pp. 60 - 76 |
---|---|
Main Authors | , , |
Format | Book Chapter Conference Proceeding |
Language | English |
Published |
Cham
Springer International Publishing
2014
|
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 3319048961 9783319048963 |
ISSN | 0302-9743 1611-3349 1611-3349 |
DOI | 10.1007/978-3-319-04897-0_5 |
Cover
Abstract | This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to be corrupted. The classic problem of fault tolerance is to modify a system so that it works despite a limited number of faults. We introduce a novel variant of this problem. Instead of demanding that the system works despite faults, we simply require that it remains secure: wrong answers may be given but secrets will not be revealed. We develop a software-based technique to achieve this fault-tolerant non-interference property. The method is defined on a simple assembly language, and guarantees security for any assembly program provided as input. The security property is defined on top of a formal model that encompasses both the fault-prone machine and the faulty environment. A precise characterization of the class of programs for which the method guarantees transparency is provided. |
---|---|
AbstractList | This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to be corrupted. The classic problem of fault tolerance is to modify a system so that it works despite a limited number of faults. We introduce a novel variant of this problem. Instead of demanding that the system works despite faults, we simply require that it remains secure: wrong answers may be given but secrets will not be revealed. We develop a software-based technique to achieve this fault-tolerant non-interference property. The method is defined on a simple assembly language, and guarantees security for any assembly program provided as input. The security property is defined on top of a formal model that encompasses both the fault-prone machine and the faulty environment. A precise characterization of the class of programs for which the method guarantees transparency is provided. This paper is about ensuring security in unreliable systems. We studysystems which are subject to transient faults – soft errors that cause stored valuesto be corrupted. The classic problem of fault tolerance is to modify a system sothat it works despite a limited number of faults. We introduce a novel variantof this problem. Instead of demanding that the system works despite faults, wesimply require that it remains secure: wrong answers may be given but secretswill not be revealed. We develop a software-based technique to achieve this fault tolerantnon-interference property. The method is defined on a simple assemblylanguage, and guarantees security for any assembly program provided as input.The security property is defined on top of a formal model that encompasses boththe fault-prone machine and the faulty environment. A precise characterization ofthe class of programs for which the method guarantees transparency is provided. |
Author | Del Tedesco, Filippo Russo, Alejandro Sands, David |
Author_xml | – sequence: 1 givenname: Filippo surname: Del Tedesco fullname: Del Tedesco, Filippo organization: Chalmers University of Technology, Sweden – sequence: 2 givenname: Alejandro surname: Russo fullname: Russo, Alejandro organization: Chalmers University of Technology, Sweden – sequence: 3 givenname: David surname: Sands fullname: Sands, David organization: Chalmers University of Technology, Sweden |
BackLink | https://research.chalmers.se/publication/211836$$DView record from Swedish Publication Index |
BookMark | eNo1kM1OAjEURqtiIiBP4EJfoNo77fRnaYioCdGFuL5pO3cEhRnSYoxvb0Vcfcn5krM4Izbo-o4YuwBxDUKYG2csl1yC40JZZ7jA-ohNCpWF7ZE4ZkPQAFxK5U7Y6P_QMGBDIUXFnVHyjE1yfhdCAFgDSg_Z5cx_rnd80a8p-W539dR3fNXtKLWUqIt0zk5bv840OeyYvc7uFtMHPn--f5zeznkGaz2voIKgIkkIxhnvattUHoJWtY6gpWqDtl5bVwff1L4h2biq0VYLHZWCysoxe_nz5i_afgbcptXGp2_s_QoTZfIpLjEu_XpDKWMmVEZp422FrqaIKjiLTjUtFgaulZFA-2KFg7X4ujdKGPr-IyMI_O2KpSBKLKlwHxFLV_kDn35mPA |
ContentType | Book Chapter Conference Proceeding |
Copyright | Springer International Publishing Switzerland 2014 |
Copyright_xml | – notice: Springer International Publishing Switzerland 2014 |
DBID | ADTPV BNKNJ F1S |
DOI | 10.1007/978-3-319-04897-0_5 |
DatabaseName | SwePub SwePub Conference SWEPUB Chalmers tekniska högskola |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783319048970 331904897X |
EISSN | 1611-3349 |
Editor | Piessens, Frank Bielova, Nataliia Jürjens, Jan |
Editor_xml | – sequence: 1 givenname: Jan surname: Jürjens fullname: Jürjens, Jan email: jan.juerjens@isst.fraunhofer.de – sequence: 2 givenname: Frank surname: Piessens fullname: Piessens, Frank email: frank.piessens@cs.kuleuven.be – sequence: 3 givenname: Nataliia surname: Bielova fullname: Bielova, Nataliia email: nataliia.bielova@inria.fr |
EndPage | 76 |
ExternalDocumentID | oai_research_chalmers_se_47467a82_95ec_4b98_94df_7a819f3ce16a |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 ADTPV BNKNJ F1S |
ID | FETCH-LOGICAL-s188a-2121b4ce31b797a958d2a1b6456c1634fb68a6895bad5ade3d92d68606c441283 |
ISBN | 3319048961 9783319048963 |
ISSN | 0302-9743 1611-3349 |
IngestDate | Thu Aug 21 06:49:57 EDT 2025 Tue Jul 29 19:44:32 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-s188a-2121b4ce31b797a958d2a1b6456c1634fb68a6895bad5ade3d92d68606c441283 |
PageCount | 17 |
ParticipantIDs | swepub_primary_oai_research_chalmers_se_47467a82_95ec_4b98_94df_7a819f3ce16a springer_books_10_1007_978_3_319_04897_0_5 |
PublicationCentury | 2000 |
PublicationDate | 2014 |
PublicationDateYYYYMMDD | 2014-01-01 |
PublicationDate_xml | – year: 2014 text: 2014 |
PublicationDecade | 2010 |
PublicationPlace | Cham |
PublicationPlace_xml | – name: Cham |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSubtitle | 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings |
PublicationTitle | Engineering Secure Software and Systems |
PublicationYear | 2014 |
Publisher | Springer International Publishing |
Publisher_xml | – name: Springer International Publishing |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany |
SSID | ssj0001187146 ssj0002792 |
Score | 1.7133824 |
Snippet | This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to... This paper is about ensuring security in unreliable systems. We studysystems which are subject to transient faults – soft errors that cause stored valuesto be... |
SourceID | swepub springer |
SourceType | Open Access Repository Publisher |
StartPage | 60 |
SubjectTerms | Assembly Program Fault Tolerance Label Transition System Non-interference Secret Data security Security Property transient faults |
Title | Fault-Tolerant Non-interference |
URI | http://link.springer.com/10.1007/978-3-319-04897-0_5 https://research.chalmers.se/publication/211836 |
Volume | 8364 LNCS |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELbYcgEOwAJiefbAicoIJ05iHzggtNVqVXqhi_Zm-RWtUNWsNqmQ-PXMxM6jYS_LJap8qJMZezwPf98Q8sEWuYdTqISdViSUu0xTbbWlxiSeGwNKd5jQ_77Ozy74-WV2OVzlbdEljflk_9yKK_kfrcIY6BVRsnfQbP-nMAC_Qb_wBA3Dc-L8HqZZYzm_ZxIMWXO_-AE29beOFYExFzl6qn672Hjna9smR5eYR7mu-nrLHl41Al5-aSQx6FMviAW-9fb7Uu-3Dd1UWw_nXbNYVzuK5BM3EUEY7BXyKNdfVrFSsa6a9gLYomsm0dmWcfKB8UnyoUs-TtKXQwbtIFpNQfNgMGS0aBG1BRYZYpow5IMRzpFaMQ1UptGwhqYD8YgOHWP-Mf7j-x4tNgvmKuhnlR2Ro0LwGbn_9fR89XNIwTGIFjEajgc3cimGolN4JYQCda_MAlnT8Ak9g1UgKZ7MOKqrTzhoW79l84Q8QizLHEEmILmn5J7fHZPHnfDnUfjH5OFoMT0j7w81O59q9jm5WJ5uvp3R2EiD1kwITcE9YYZbnzJTyELLTLhEM5OD82zBH-elyYXOhcyMhs3qfOpk4nIBsa0Fbxkc0Bdktqt2_iWZm1KARYeNzUvJIZbW6C8j2NmVhdO2OCEfuw9XuDVq1fFig5RUqkBKqpWSAimdkFUQjboO1CoKyc4jy9WVsldtC6Fa1V5xbIujRaJk5q3iRgolYU4FY0yWqfUs16_uMvdr8mBY0G_IrLnZ-7fgXzbmXVwnfwEMpXD1 |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Engineering+Secure+Software+and+Systems&rft.au=Del+Tedesco%2C+Filippo&rft.au=Russo%2C+Alejandro&rft.au=Sands%2C+David&rft.atitle=Fault-Tolerant+Non-interference&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2014-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319048963&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=60&rft.epage=76&rft_id=info:doi/10.1007%2F978-3-319-04897-0_5 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |