{"title":"Work-in-Progress: Design of Security-Critical Distributed Real-Time Applications with Fault-Tolerant Constraint","authors":"Wei Jiang, Haibo Hu, Jinyu Zhan, Ke Jiang","doi":"10.1109/EMSOFT.2018.8537217","DOIUrl":null,"url":null,"abstract":"We approach the design of security-critical distributed applications with task-level fault-tolerant techniques. We focus on the impact of fault tolerance on secure message communication, which was seriously overlooked before. Fault-tolerant techniques, e.g., task re-execution and active replica, are leveraged to tolerate faults in task executions, while cryptography is deployed to protect the confidentiality of messages delivered over the communication media. The design problem is to minimize the schedule length and security vulnerability of the application, subject to given fault-tolerant constraints. We then propose a multi-objective optimization method to find the best solutions. Initial experiments indicated the efficiency.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Embedded Software (EMSOFT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EMSOFT.2018.8537217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
We approach the design of security-critical distributed applications with task-level fault-tolerant techniques. We focus on the impact of fault tolerance on secure message communication, which was seriously overlooked before. Fault-tolerant techniques, e.g., task re-execution and active replica, are leveraged to tolerate faults in task executions, while cryptography is deployed to protect the confidentiality of messages delivered over the communication media. The design problem is to minimize the schedule length and security vulnerability of the application, subject to given fault-tolerant constraints. We then propose a multi-objective optimization method to find the best solutions. Initial experiments indicated the efficiency.