A survey on SCADA systems: secure protocols, incidents, threats and tactics

D Pliatsios, P Sarigiannidis, T Lagkas… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring
and control components of critical infrastructures, such as power, telecommunication …

Byzantine fault-tolerant state-machine replication from a systems perspective

T Distler - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Byzantine fault-tolerant (BFT) state-machine replication makes it possible to design systems
that are resilient against arbitrary faults, a requirement considered crucial for an increasing …

Lazarus: Automatic management of diversity in bft systems

M Garcia, A Bessani, N Neves - Proceedings of the 20th International …, 2019 - dl.acm.org
A long-standing promise of Byzantine Fault-Tolerant (BFT) replication is to maintain the
service correctness despite the presence of malicious failures. The key challenge here is …

Scientific workflow execution system based on mimic defense in the cloud environment

Y Wang, J Wu, Y Guo, H Hu, W Liu, G Cheng - Frontiers of Information …, 2018 - Springer
With more large-scale scientific computing tasks being delivered to cloud computing
platforms, cloud workflow systems are designed for managing and arranging these …

Network-attack-resilient intrusion-tolerant SCADA for the power grid

A Babay, T Tantillo, T Aron… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
As key components of the power grid infrastructure, Supervisory Control and Data
Acquisition (SCADA) systems are likely to be targeted by nation-state-level attackers willing …

Quantifying cybersecurity effectiveness of dynamic network diversity

H Chen, H Cam, S Xu - IEEE Transactions on Dependable and …, 2021 - ieeexplore.ieee.org
The deployment of monoculture software stacks can have devastating consequences
because a single attack can compromise all of the vulnerable computers in cyberspace. This …

On choosing server-or client-side solutions for BFT

M Platania, D Obenshain, T Tantillo, Y Amir… - ACM Computing Surveys …, 2016 - dl.acm.org
Byzantine Fault Tolerant (BFT) protocols have the ability to work correctly even when up to a
threshold f of system servers are compromised. This makes them appealing for the …

SieveQ: A Layered BFT Protection System for Critical Services

M Garcia, N Neves, A Bessani - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Firewalls play a crucial role in assuring the security of today's critical infrastructures, forming
a first line of defense by being placed strategically at the front-end of the networks …

Practical intrusion-tolerant networks

D Obenshain, T Tantillo, A Babay… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
As the Internet becomes an important part of the infrastructure our society depends on, it is
crucial to construct networks that are able to work even when part of the network is …

SeReNe: on establishing secure and resilient networking services for an SDN-based multi-tenant datacenter environment

CJ Chung, T **ng, D Huang, D Medhi… - … Systems and Networks …, 2015 - ieeexplore.ieee.org
In the current enterprise data enter networking environment, a major hurdle in the
development of network security is the lack of an orchestrated and resilient defensive …