Silent data corruptions: Microarchitectural perspectives
G Papadimitriou, D Gizopoulos - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Today more than ever before, academia, manufacturers, and hyperscalers acknowledge the
major challenge of silent data corruptions (SDCs) and aim on solutions to minimize its …
major challenge of silent data corruptions (SDCs) and aim on solutions to minimize its …
kMVX: Detecting kernel information leaks with multi-variant execution
Kernel information leak vulnerabilities are a major security threat to production systems.
Attackers can exploit them to leak confidential information such as cryptographic keys or …
Attackers can exploit them to leak confidential information such as cryptographic keys or …
Silent data corruptions: The stealthy saboteurs of digital integrity
G Papadimitriou, D Gizopoulos… - 2023 IEEE 29th …, 2023 - ieeexplore.ieee.org
Silent Data Corruptions (SDCs) pose a significant threat to the integrity of digital systems.
These stealthy saboteurs silently corrupt data, remaining undetected by traditional error …
These stealthy saboteurs silently corrupt data, remaining undetected by traditional error …
Proof-of-execution: Reaching consensus through fault-tolerant speculation
Since the introduction of blockchains, several new database systems and applications have
tried to employ them. At the core of such blockchain designs are Byzantine Fault-Tolerant …
tried to employ them. At the core of such blockchain designs are Byzantine Fault-Tolerant …
Fault tolerance through redundant execution on cots multicores: Exploring trade-offs
Y Shen, G Heiser, K Elphinstone - 2019 49th Annual IEEE/IFIP …, 2019 - ieeexplore.ieee.org
High availability and integrity are paramount in systems deployed in life-and mission-critical
scenarios. Such fault-tolerance can be achieved through redundant co-execution (RCoE) on …
scenarios. Such fault-tolerance can be achieved through redundant co-execution (RCoE) on …
Multi-Variant Execution Research of Software Diversity
Z Liu, Z Zhang, J Zhang, H Liu - Journal of Physics: Conference …, 2019 - iopscience.iop.org
As more and more software products are threatened by malicious reverse analysis, along
with software products are pirated, tampered with and so on, it is of great significance to …
with software products are pirated, tampered with and so on, it is of great significance to …
Block-Checksum-Based fault tolerance for matrix multiplication on large-scale parallel systems
With the scaling up of high performance computers, resilience has become a big challenge.
Among various kinds of software-based fault-tolerant approaches, the algorithm-based fault …
Among various kinds of software-based fault-tolerant approaches, the algorithm-based fault …
Tricking Hardware into Efficiently Securing Software
K Koning - 2021 - research.vu.nl
Computersoftware zit vol bugs die worden veroorzaakt door programmeerfouten. Hoewel de
meeste bugs niet schadelijk zijn, kunnen sommige door aanvallers misbruikt worden om …
meeste bugs niet schadelijk zijn, kunnen sommige door aanvallers misbruikt worden om …