Silent data corruptions: Microarchitectural perspectives

G Papadimitriou, D Gizopoulos - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Today more than ever before, academia, manufacturers, and hyperscalers acknowledge the
major challenge of silent data corruptions (SDCs) and aim on solutions to minimize its …

kMVX: Detecting kernel information leaks with multi-variant execution

S Österlund, K Koning, P Olivier, A Barbalace… - Proceedings of the …, 2019 - dl.acm.org
Kernel information leak vulnerabilities are a major security threat to production systems.
Attackers can exploit them to leak confidential information such as cryptographic keys or …

Silent data corruptions: The stealthy saboteurs of digital integrity

G Papadimitriou, D Gizopoulos… - 2023 IEEE 29th …, 2023 - ieeexplore.ieee.org
Silent Data Corruptions (SDCs) pose a significant threat to the integrity of digital systems.
These stealthy saboteurs silently corrupt data, remaining undetected by traditional error …

Proof-of-execution: Reaching consensus through fault-tolerant speculation

S Gupta, J Hellings, S Rahnama, M Sadoghi - arXiv preprint arXiv …, 2019 - arxiv.org
Since the introduction of blockchains, several new database systems and applications have
tried to employ them. At the core of such blockchain designs are Byzantine Fault-Tolerant …

Fault tolerance through redundant execution on cots multicores: Exploring trade-offs

Y Shen, G Heiser, K Elphinstone - 2019 49th Annual IEEE/IFIP …, 2019 - ieeexplore.ieee.org
High availability and integrity are paramount in systems deployed in life-and mission-critical
scenarios. Such fault-tolerance can be achieved through redundant co-execution (RCoE) on …

Multi-Variant Execution Research of Software Diversity

Z Liu, Z Zhang, J Zhang, H Liu - Journal of Physics: Conference …, 2019 - iopscience.iop.org
As more and more software products are threatened by malicious reverse analysis, along
with software products are pirated, tampered with and so on, it is of great significance to …

Block-Checksum-Based fault tolerance for matrix multiplication on large-scale parallel systems

Y Zhu, Y Liu, M Li, D Qian - … Conference on Smart City; IEEE 4th …, 2018 - ieeexplore.ieee.org
With the scaling up of high performance computers, resilience has become a big challenge.
Among various kinds of software-based fault-tolerant approaches, the algorithm-based fault …

Tricking Hardware into Efficiently Securing Software

K Koning - 2021 - research.vu.nl
Computersoftware zit vol bugs die worden veroorzaakt door programmeerfouten. Hoewel de
meeste bugs niet schadelijk zijn, kunnen sommige door aanvallers misbruikt worden om …