A survey on SCADA systems: secure protocols, incidents, threats and tactics
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring
and control components of critical infrastructures, such as power, telecommunication …
and control components of critical infrastructures, such as power, telecommunication …
Byzantine fault-tolerant state-machine replication from a systems perspective
T Distler - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Byzantine fault-tolerant (BFT) state-machine replication makes it possible to design systems
that are resilient against arbitrary faults, a requirement considered crucial for an increasing …
that are resilient against arbitrary faults, a requirement considered crucial for an increasing …
Lazarus: Automatic management of diversity in bft systems
A long-standing promise of Byzantine Fault-Tolerant (BFT) replication is to maintain the
service correctness despite the presence of malicious failures. The key challenge here is …
service correctness despite the presence of malicious failures. The key challenge here is …
Scientific workflow execution system based on mimic defense in the cloud environment
Y Wang, J Wu, Y Guo, H Hu, W Liu, G Cheng - Frontiers of Information …, 2018 - Springer
With more large-scale scientific computing tasks being delivered to cloud computing
platforms, cloud workflow systems are designed for managing and arranging these …
platforms, cloud workflow systems are designed for managing and arranging these …
Network-attack-resilient intrusion-tolerant SCADA for the power grid
A Babay, T Tantillo, T Aron… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
As key components of the power grid infrastructure, Supervisory Control and Data
Acquisition (SCADA) systems are likely to be targeted by nation-state-level attackers willing …
Acquisition (SCADA) systems are likely to be targeted by nation-state-level attackers willing …
Quantifying cybersecurity effectiveness of dynamic network diversity
The deployment of monoculture software stacks can have devastating consequences
because a single attack can compromise all of the vulnerable computers in cyberspace. This …
because a single attack can compromise all of the vulnerable computers in cyberspace. This …
On choosing server-or client-side solutions for BFT
Byzantine Fault Tolerant (BFT) protocols have the ability to work correctly even when up to a
threshold f of system servers are compromised. This makes them appealing for the …
threshold f of system servers are compromised. This makes them appealing for the …
SieveQ: A Layered BFT Protection System for Critical Services
Firewalls play a crucial role in assuring the security of today's critical infrastructures, forming
a first line of defense by being placed strategically at the front-end of the networks …
a first line of defense by being placed strategically at the front-end of the networks …
Practical intrusion-tolerant networks
As the Internet becomes an important part of the infrastructure our society depends on, it is
crucial to construct networks that are able to work even when part of the network is …
crucial to construct networks that are able to work even when part of the network is …
SeReNe: on establishing secure and resilient networking services for an SDN-based multi-tenant datacenter environment
In the current enterprise data enter networking environment, a major hurdle in the
development of network security is the lack of an orchestrated and resilient defensive …
development of network security is the lack of an orchestrated and resilient defensive …