Common Techniques in Fault Tolerance and Security (and Performance!)
The commonality between fault tolerance techniques and security techniques is considered here as it relates to the design of general purpose computer systems. The thesis of this presentation is that although fault tolerance and security are important computer system attributes, the computer industry is driven by cost/performance. It is incumbent upon fault-tolerant-computing and computer-security researchers to seek techniques and mechanisms that have commonality with those used to achieve high performance, so that new fault tolerance or security measures have a minimal impact on cost/performance and are likely to be included in new systems. An example of a traditional technique that provides fault tolerance, security, and high performance is given below, and an emerging approach is shown to be connected to each of these properties. Other promising areas are suggested where connections among these three computer system properties might be established.
KeywordsFault Tolerance Computer Virus Covert Channel Virtual Memory Performance Overhead
Unable to display preview. Download preview PDF.
- N.J. Alewine, S.-K. Chen, C.-C. Li, W.K. Fuchs, and W.-M. Hwu. Branch recovery with compiler-assisted multiple instruction retry. In Proc. 22nd FTCS, pages 66-73. IEEE, 1992.Google Scholar
- T. Ball and J. Larus. Optimally profiling and tracing programs. In Principles of Programming Languages, pages 59-70, January 1992.Google Scholar
- M. Joseph and A. Avizienis. A fault tolerance approach to computer viruses. In Proc. Symp. on Security and Privacy, pages 52-58. IEEE, 1988.Google Scholar
- D. Knuth. The Art of Computer Programming: Vol. 1, Fundamental Algorithms, volume 1. Addison Wesley, 1973.Google Scholar
- K. Wilken and T. Kong. Efficient memory access checking. In Proc. 23nd FTCS, pages 566-575. IEEE, 1993.Google Scholar
- K. Wilken and J. Shen. Concurrent error detection using signature monitoring and encryption. In Proc. 1st IFIP Working Conference on Dependable Computing for Critical Applications, pages 365-384. Springer-Verlag, 1991.Google Scholar