Implementing fault-tolerant services using the state machine approach: a tutorial
ACM Computing Surveys (CSUR)
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Practical byzantine fault tolerance and proactive recovery
ACM Transactions on Computer Systems (TOCS)
Countering code-injection attacks with instruction-set randomization
Proceedings of the 10th ACM conference on Computer and communications security
CODEX: A Robust and Secure Secret Distribution System
IEEE Transactions on Dependable and Secure Computing
On the effectiveness of address-space randomization
Proceedings of the 11th ACM conference on Computer and communications security
SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
Randomized instruction set emulation
ACM Transactions on Information and System Security (TISSEC)
Soft Errors in Advanced Computer Systems
IEEE Design & Test
A Replication- and Checkpoint-Based Approach for Anomaly-Based Intrusion Detection and Recovery
ICDCSW '05 Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02
Implementing Trustworthy Services Using Replicated State Machines
IEEE Security and Privacy
DieHard: probabilistic memory safety for unsafe languages
Proceedings of the 2006 ACM SIGPLAN conference on Programming language design and implementation
Proactive resilience through architectural hybridization
Proceedings of the 2006 ACM symposium on Applied computing
SRDS '06 Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems
Address obfuscation: an efficient approach to combat a board range of memory error exploits
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Where's the FEEB? the effectiveness of instruction set randomization
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Hidden problems of asynchronous proactive recovery
HotDep'07 Proceedings of the 3rd workshop on on Hot Topics in System Dependability
Resilient Intrusion Tolerance through Proactive and Reactive Recovery
PRDC '07 Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing
Flipping Coins In Many Pockets (Byzantine Agreement On Uniformly Random Values)
SFCS '84 Proceedings of the 25th Annual Symposium onFoundations of Computer Science, 1984
Enhancing an Application Server to Support Available Components
IEEE Transactions on Software Engineering
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
IEEE Transactions on Dependable and Secure Computing
Hi-index | 0.00 |
We present an approach for incorporating intrusion resilience to replicated services, irrespective of the service replication used and of the fault types tolerated. The approach, termed as FORTRESS, involves fortifying a fault-tolerant service using proxies that block clients from accessing the servers directly, and periodically refreshing proxies and servers with diverse executables generated using code randomization. These two features make it hard for an attacker to compromise a server when no proxy has been compromised. An analytical evaluation establishes that if attackers cannot intrude servers without first having compromised a proxy, fortifying even a passively replicated service can offer greater resilience than building that service as a deterministic state machine and actively replicating it over diverse platforms. Finally, the FORTRESS architecture is presented where proactive code randomization is achieved by proactive replacement of server and proxy nodes. Examining the state transfer protocol executed during node replacement shows that the processing overhead per replacement is no more than the overhead for changing the leader or the primary replica in replication management.