DocumentCode :
2897753
Title :
Security through redundant data diversity
Author :
Nguyen-Tuong, Anh ; Evans, David ; Knight, John C. ; Cox, Benjamin ; Davidson, Jack W.
Author_Institution :
Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA
fYear :
2008
fDate :
24-27 June 2008
Firstpage :
187
Lastpage :
196
Abstract :
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously compromise multiple variants with the same input) and tailored diversity (to make it impossible to compromise all the variants with the same input for given attack classes). In this work, we develop a method for using data diversity in N-variant systems to provide high-assurance arguments against a class of data corruption attacks. Data is transformed in the variants so identical concrete data values have different interpretations. In order to corrupt the data without detection, an attacker would need to alter the corresponding data in each variant in a different way while sending the same inputs to all variants. We demonstrate our approach with a case study using that thwarts attacks that corrupt UID values.
Keywords :
security of data; software fault tolerance; N-variant system; data corruption attack; redundant data diversity; software fault tolerance; Computer architecture; Computer science; Computer security; Concrete; Data security; Distributed computing; Lifting equipment; Monitoring; Redundancy; Voting;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on
Conference_Location :
Anchorage, AK
Print_ISBN :
978-1-4244-2397-2
Electronic_ISBN :
978-1-4244-2398-9
Type :
conf
DOI :
10.1109/DSN.2008.4630087
Filename :
4630087
Link To Document :
بازگشت