Architectural Support for Hypervisor-Level Intrusion Tolerance in MPSoCs

I Pinto Gouveia - 2022 - orbilu.uni.lu
Increasingly, more aspects of our lives rely on the correctness and safety of computing
systems, namely in the embedded and cyber-physical (CPS) domains, which directly affect …

Protection Switching for Efficient Fail-Operational and Hard Real-Time Communication in Network on Chip

MWN Koenen - 2023 - mediatum.ub.tum.de
Abstract Multi-and even Manycore Processor System on Chips (MPSoCs) are becoming
increasingly prevalent in embedded systems. However, despite their technical and …

Classifying trusted hardware via unidirectional communication

N Ben-David, K Nayak - arXiv preprint arXiv:2105.10566, 2021 - arxiv.org
It is well known that Byzantine fault tolerant (BFT) consensus cannot be solved in the classic
asynchronous message passing model when one-third or more of the processes may be …

Multi-threshold byzantine fault tolerance

A Momose, L Ren - Proceedings of the 2021 ACM SIGSAC Conference …, 2021 - dl.acm.org
Classic Byzantine fault tolerant (BFT) protocols are designed for a specific timing model,
most often one of the following: synchronous, asynchronous or partially synchronous. It is …

[HTML][HTML] Deterministic or probabilistic?-A survey on Byzantine fault tolerant state machine replication

T Freitas, J Soares, ME Correia, R Martins - Computers & Security, 2023 - Elsevier
Byzantine Fault tolerant (BFT) protocols are implemented to guarantee the correct
system/application behavior even in the presence of arbitrary faults (ie, Byzantine faults) …

Security-aware routing and scheduling for control applications on Ethernet TSN networks

R Mahfouzi, A Aminifar, S Samii, P Eles… - ACM Transactions on …, 2019 - dl.acm.org
Today, it is common knowledge in the cyber-physical systems domain that the tight
interaction between the cyber and physical elements provides the possibility of substantially …

Upright fault tolerance

AG Clement - 2010 - repositories.lib.utexas.edu
Experiences with computer systems indicate an inconvenient truth: computers fail and they
fail in interesting ways. Although using redundancy to protect against fail-stop failures is …

[图书][B] Intrusion and fault tolerance: For wireline and wireless networks

C Basile - 2005 - search.proquest.com
The integration of wireline networks with wireless ad hoc networks is expected to have a
revolutionary impact on a wide range of applications by enabling pervasive computing. For …

[PDF][PDF] Memory-Efficient Byzantine Fault-Tolerant Replication for Highly Resource-Constrained Systems

H Böhm, T Distler - robust2024.github.io
Recently, possible application scenarios of Byzantine fault tolerant (BFT) state-machine
replication have been expanded to include highly resource-constrained nodes, with RAM of …

ezbft: Decentralizing byzantine fault-tolerant state machine replication

B Arun, S Peluso, B Ravindran - 2019 IEEE 39th International …, 2019 - ieeexplore.ieee.org
We present ezBFT, a novel leaderless, distributed consensus protocol capable of tolerating
byzantine faults. ezBFT's main goal is to minimize the client-side latency in WAN …