Supplemental Material
Available for Download
- Y. Amir, B. Coan, J. Kirsch, and J. Lane. Prime: Byzantine replication under attack. IEEE Transactions on Dependable and Secure Computing, 8(4):564-577, 2011. Google ScholarDigital Library
- A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky. HyperSentry: Enabling stealthy in-context measurement of hypervisor integrity. In Proceedings of the 17th ACM Converence on Computer and Communications Security, pages 38-49, 2010. Google ScholarDigital Library
- S. Baker, S. Waterman, and G. Ivanov. In the crossfire: Critical infrastructure in the age of cyber war, 2009.Google Scholar
- P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM symposium on operating systems principles, pages 164-177, 2003. Google ScholarDigital Library
- M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst., 20(4):398-461, 2002. Google ScholarDigital Library
- A. Clement, E. Wong, L. Alvisi, M. Dahlin, and M. Marchetti. Making Byzantine fault tolerant systems tolerate Byzantine faults. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pages 153-168, 2009. Google ScholarDigital Library
- B. Cully, G. Lefebvre, D. Meyer, M. Feeley, N. Hutchinson, and A. Warfield. Remus: High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pages 161-174, 2008. Google ScholarDigital Library
- J. Kirsch. Intrusion-Tolerant Replication Under Attack. PhD thesis, The Johns Hopkins University, Baltimore, Maryland, 2010. Google ScholarDigital Library
- L. Lamport. Time, clocks, and the ordering of events in a distributed system. Commun. ACM, 21(7):558-565, 1978. Google ScholarDigital Library
- L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382-401, 1982. Google ScholarDigital Library
- F. B. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, 22(4):299-319, 1990. Google ScholarDigital Library
- VMware. Protecting mission-critical workloads with VMware Fault Tolerance, 2009.Google Scholar
- Z. Wang and X. Jiang. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Proceedings of the 31st IEEE Symposium on Security and Privacy, pages 380-395, 2010. Google ScholarDigital Library
Recommendations
A Secure and Survivable Architecture for SCADA Systems
DEPEND '09: Proceedings of the 2009 Second International Conference on DependabilityIndustrial Systems are nowadays exposed to new kinds of malicious threats. The cause of this is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Networking Technologies for the ...
Survivable mapping of virtual topologies for double-node failure
In multilayer network design, the mapping of logical links onto the physical layer plays a critical role in failure tolerance of the network. Since a single link or node failure in the physical layer can bring several logical links down, it is important ...
Comments