Fault-Tolerant Non-interference

This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to be corrupted. The classic problem of fault tolerance is to modify a system so that it works despite a limited number of faults. We introduce a...

Full description

Saved in:
Bibliographic Details
Published inEngineering Secure Software and Systems Vol. 8364 LNCS; pp. 60 - 76
Main Authors Del Tedesco, Filippo, Russo, Alejandro, Sands, David
Format Book Chapter Conference Proceeding
LanguageEnglish
Published Cham Springer International Publishing 2014
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3319048961
9783319048963
ISSN0302-9743
1611-3349
1611-3349
DOI10.1007/978-3-319-04897-0_5

Cover

Abstract This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to be corrupted. The classic problem of fault tolerance is to modify a system so that it works despite a limited number of faults. We introduce a novel variant of this problem. Instead of demanding that the system works despite faults, we simply require that it remains secure: wrong answers may be given but secrets will not be revealed. We develop a software-based technique to achieve this fault-tolerant non-interference property. The method is defined on a simple assembly language, and guarantees security for any assembly program provided as input. The security property is defined on top of a formal model that encompasses both the fault-prone machine and the faulty environment. A precise characterization of the class of programs for which the method guarantees transparency is provided.
AbstractList This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to be corrupted. The classic problem of fault tolerance is to modify a system so that it works despite a limited number of faults. We introduce a novel variant of this problem. Instead of demanding that the system works despite faults, we simply require that it remains secure: wrong answers may be given but secrets will not be revealed. We develop a software-based technique to achieve this fault-tolerant non-interference property. The method is defined on a simple assembly language, and guarantees security for any assembly program provided as input. The security property is defined on top of a formal model that encompasses both the fault-prone machine and the faulty environment. A precise characterization of the class of programs for which the method guarantees transparency is provided.
This paper is about ensuring security in unreliable systems. We studysystems which are subject to transient faults – soft errors that cause stored valuesto be corrupted. The classic problem of fault tolerance is to modify a system sothat it works despite a limited number of faults. We introduce a novel variantof this problem. Instead of demanding that the system works despite faults, wesimply require that it remains secure: wrong answers may be given but secretswill not be revealed. We develop a software-based technique to achieve this fault tolerantnon-interference property. The method is defined on a simple assemblylanguage, and guarantees security for any assembly program provided as input.The security property is defined on top of a formal model that encompasses boththe fault-prone machine and the faulty environment. A precise characterization ofthe class of programs for which the method guarantees transparency is provided.
Author Del Tedesco, Filippo
Russo, Alejandro
Sands, David
Author_xml – sequence: 1
  givenname: Filippo
  surname: Del Tedesco
  fullname: Del Tedesco, Filippo
  organization: Chalmers University of Technology, Sweden
– sequence: 2
  givenname: Alejandro
  surname: Russo
  fullname: Russo, Alejandro
  organization: Chalmers University of Technology, Sweden
– sequence: 3
  givenname: David
  surname: Sands
  fullname: Sands, David
  organization: Chalmers University of Technology, Sweden
BackLink https://research.chalmers.se/publication/211836$$DView record from Swedish Publication Index
BookMark eNo1kM1OAjEURqtiIiBP4EJfoNo77fRnaYioCdGFuL5pO3cEhRnSYoxvb0Vcfcn5krM4Izbo-o4YuwBxDUKYG2csl1yC40JZZ7jA-ohNCpWF7ZE4ZkPQAFxK5U7Y6P_QMGBDIUXFnVHyjE1yfhdCAFgDSg_Z5cx_rnd80a8p-W539dR3fNXtKLWUqIt0zk5bv840OeyYvc7uFtMHPn--f5zeznkGaz2voIKgIkkIxhnvattUHoJWtY6gpWqDtl5bVwff1L4h2biq0VYLHZWCysoxe_nz5i_afgbcptXGp2_s_QoTZfIpLjEu_XpDKWMmVEZp422FrqaIKjiLTjUtFgaulZFA-2KFg7X4ujdKGPr-IyMI_O2KpSBKLKlwHxFLV_kDn35mPA
ContentType Book Chapter
Conference Proceeding
Copyright Springer International Publishing Switzerland 2014
Copyright_xml – notice: Springer International Publishing Switzerland 2014
DBID ADTPV
BNKNJ
F1S
DOI 10.1007/978-3-319-04897-0_5
DatabaseName SwePub
SwePub Conference
SWEPUB Chalmers tekniska högskola
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783319048970
331904897X
EISSN 1611-3349
Editor Piessens, Frank
Bielova, Nataliia
Jürjens, Jan
Editor_xml – sequence: 1
  givenname: Jan
  surname: Jürjens
  fullname: Jürjens, Jan
  email: jan.juerjens@isst.fraunhofer.de
– sequence: 2
  givenname: Frank
  surname: Piessens
  fullname: Piessens, Frank
  email: frank.piessens@cs.kuleuven.be
– sequence: 3
  givenname: Nataliia
  surname: Bielova
  fullname: Bielova, Nataliia
  email: nataliia.bielova@inria.fr
EndPage 76
ExternalDocumentID oai_research_chalmers_se_47467a82_95ec_4b98_94df_7a819f3ce16a
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ADTPV
BNKNJ
F1S
ID FETCH-LOGICAL-s188a-2121b4ce31b797a958d2a1b6456c1634fb68a6895bad5ade3d92d68606c441283
ISBN 3319048961
9783319048963
ISSN 0302-9743
1611-3349
IngestDate Thu Aug 21 06:49:57 EDT 2025
Tue Jul 29 19:44:32 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s188a-2121b4ce31b797a958d2a1b6456c1634fb68a6895bad5ade3d92d68606c441283
PageCount 17
ParticipantIDs swepub_primary_oai_research_chalmers_se_47467a82_95ec_4b98_94df_7a819f3ce16a
springer_books_10_1007_978_3_319_04897_0_5
PublicationCentury 2000
PublicationDate 2014
PublicationDateYYYYMMDD 2014-01-01
PublicationDate_xml – year: 2014
  text: 2014
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings
PublicationTitle Engineering Secure Software and Systems
PublicationYear 2014
Publisher Springer International Publishing
Publisher_xml – name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany
SSID ssj0001187146
ssj0002792
Score 1.7133824
Snippet This paper is about ensuring security in unreliable systems. We study systems which are subject to transient faults – soft errors that cause stored values to...
This paper is about ensuring security in unreliable systems. We studysystems which are subject to transient faults – soft errors that cause stored valuesto be...
SourceID swepub
springer
SourceType Open Access Repository
Publisher
StartPage 60
SubjectTerms Assembly Program
Fault Tolerance
Label Transition System
Non-interference
Secret Data
security
Security Property
transient faults
Title Fault-Tolerant Non-interference
URI http://link.springer.com/10.1007/978-3-319-04897-0_5
https://research.chalmers.se/publication/211836
Volume 8364 LNCS
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELbYcgEOwAJiefbAicoIJ05iHzggtNVqVXqhi_Zm-RWtUNWsNqmQ-PXMxM6jYS_LJap8qJMZezwPf98Q8sEWuYdTqISdViSUu0xTbbWlxiSeGwNKd5jQ_77Ozy74-WV2OVzlbdEljflk_9yKK_kfrcIY6BVRsnfQbP-nMAC_Qb_wBA3Dc-L8HqZZYzm_ZxIMWXO_-AE29beOFYExFzl6qn672Hjna9smR5eYR7mu-nrLHl41Al5-aSQx6FMviAW-9fb7Uu-3Dd1UWw_nXbNYVzuK5BM3EUEY7BXyKNdfVrFSsa6a9gLYomsm0dmWcfKB8UnyoUs-TtKXQwbtIFpNQfNgMGS0aBG1BRYZYpow5IMRzpFaMQ1UptGwhqYD8YgOHWP-Mf7j-x4tNgvmKuhnlR2Ro0LwGbn_9fR89XNIwTGIFjEajgc3cimGolN4JYQCda_MAlnT8Ak9g1UgKZ7MOKqrTzhoW79l84Q8QizLHEEmILmn5J7fHZPHnfDnUfjH5OFoMT0j7w81O59q9jm5WJ5uvp3R2EiD1kwITcE9YYZbnzJTyELLTLhEM5OD82zBH-elyYXOhcyMhs3qfOpk4nIBsa0Fbxkc0Bdktqt2_iWZm1KARYeNzUvJIZbW6C8j2NmVhdO2OCEfuw9XuDVq1fFig5RUqkBKqpWSAimdkFUQjboO1CoKyc4jy9WVsldtC6Fa1V5xbIujRaJk5q3iRgolYU4FY0yWqfUs16_uMvdr8mBY0G_IrLnZ-7fgXzbmXVwnfwEMpXD1
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Engineering+Secure+Software+and+Systems&rft.au=Del+Tedesco%2C+Filippo&rft.au=Russo%2C+Alejandro&rft.au=Sands%2C+David&rft.atitle=Fault-Tolerant+Non-interference&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2014-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319048963&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=60&rft.epage=76&rft_id=info:doi/10.1007%2F978-3-319-04897-0_5
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon