Meeting the challenges of critical and extreme dependability and security

Paulo Jorge Esteves Veríssimo, Marcus Völp, Jeremie Decouchant, Vincent Rahli, Francisco Rocha

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The world is becoming an immense critical information infrastructure, with the fast and increasing entanglement of utilities, telecommunications, Internet, cloud, and the emerging IoT tissue. This may create enormous opportunities, but also brings about similarly extreme security and dependability risks. We predict an increase in very sophisticated targeted attacks, or advanced persistent threats (APT), and claim that this calls for expanding the frontier of security and dependability methods and techniques used in our current CII. Extreme threats require extreme defenses: we propose resilience as a unifying paradigm to endow systems with the capability of dynamically and automatically handling extreme adversary power, and sustaining perpetual and unattended operation. In this position paper, we present this vision and describe our methodology, as well as the assurance arguments we make for the ultra-resilient components and protocols they enable, illustrated with case studies in progress.
Original languageEnglish
Title of host publication22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017
EditorsDong Seong Kim, Masato Kitakami, Vijay Varadharajan
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages92-97
Number of pages6
ISBN (Print)9781509056514
DOIs
Publication statusPublished - 8 May 2017
Event22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017 - Christchurch, New Zealand
Duration: 22 Jan 201725 Jan 2017

Conference

Conference22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017
Country/TerritoryNew Zealand
CityChristchurch
Period22/01/1725/01/17

Fingerprint

Dive into the research topics of 'Meeting the challenges of critical and extreme dependability and security'. Together they form a unique fingerprint.

Cite this