Challenging Malicious Inputs with Fault Tolerance Techniques

نویسنده

  • Bruno L. C. Ramos
چکیده

Most of the attacks attempt an initial activation which means the first occurrence of an error provoked by the fault. If its unable to stop the propagation, a fault will be transformed into a failure, causing consequences. This paper presents an exploratory research about the integration of fault tolerance aiming defenses against malicious inputs. When a fault occurs, these techniques provide mechanisms to prevent the occurrence of software systems’ failures. Several programming methods that are used by several software, fault tolerance techniques include: assertions, checkpointing and atomic actions. Some basic and classic techniques provided by software fault tolerance that will be covered are: Recovery Block, N-Version Programming, Retry Blocks and N-Copy Programming.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Checkpointing Protocol for Survivable Server Design

Secure checkpointing appears to be a useful technique for designing survivable systems. These are fault-tolerant systems that are robust against malicious security attacks. Secure checkpointing, however, is not easily done. Without adequate protection, the checkpointing process can be attacked and compromised. The checkpointing data can be subjected to malicious attacks and be a source of secur...

متن کامل

Fault Tolerance Techniques in Grid Computing Systems

In grid computing, resources are used outside the boundary of organizations and it becomes increasingly difficult to guarantee that resources being used are not malicious. Also, resources may enter and leave the grid at any time. So, fault tolerance is a crucial issue in grid computing. Fault tolerance can enhance grid throughput, utilization, response time and more economic profits. All mechan...

متن کامل

Providing Fault Tolerance in Grid Computing Systems

In grid computing, resources are used outside the boundary of organizations and it becomes increasingly difficult to guarantee that resources being used are not malicious. Also, resources may enter and leave the grid at any time. So, fault tolerance is a crucial issue in grid computing. Fault tolerance can enhance grid throughput, utilization, response time and more economic profits. All mechan...

متن کامل

An Optimal Agreement in a Cluster-based Wireless Sensor Network with Malicious Faulty Nodes

A cluster of sensor nodes in Cluster-based Wireless Sensor Network (CWSN) is cooperating to achieve some objectives. For CWSN, the fault-tolerance and reliability has been an important topic. The problem of reaching agreement in the distributed system is one of the most important issues to design a fault-tolerance system. In previous works, reach a common agreement among healthy nodes to cope w...

متن کامل

An approach to fault detection and correction in design of systems using of Turbo ‎codes‎

We present an approach to design of fault tolerant computing systems. In this paper, a technique is employed that enable the combination of several codes, in order to obtain flexibility in the design of error correcting codes. Code combining techniques are very effective, which one of these codes are turbo codes. The Algorithm-based fault tolerance techniques that to detect errors rely on the c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007