Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

International Conference on Fundamentals of Software Engineering

FSEN 2015: Fundamentals of Software Engineering pp 84–99Cite as

  1. Home
  2. Fundamentals of Software Engineering
  3. Conference paper
A Theory of Integrating Tamper Evidence with Stabilization

A Theory of Integrating Tamper Evidence with Stabilization

  • Reza Hajisheykhi15,
  • Ali Ebnenasir16 &
  • Sandeep S. Kulkarni15 
  • Conference paper
  • First Online: 12 November 2015
  • 679 Accesses

Part of the Lecture Notes in Computer Science book series (LNPSE,volume 9392)

Abstract

We propose the notion of tamper-evident stabilization –that combines stabilization with the concept of tamper evidence– for computing systems. On the first glance, these notions are contradictory; stabilization requires that eventually the system functionality is fully restored whereas tamper evidence requires that the system functionality is permanently degraded in the event of tampering. Tamper-evident stabilization captures the intuition that the system will tolerate perturbation upto a limit. In the event that it is perturbed beyond that limit, it will exhibit permanent evidence of tampering, where it may provide reduced (possibly none) functionality. We compare tamper-evident stabilization with (conventional) stabilization and with active stabilization and propose an approach to verify tamper-evident stabilizing programs in polynomial time. We demonstrate tamper-evident stabilization with two examples and argue how approaches for designing stabilization can be used to design tamper-evident stabilization. We also study issues of composition in tamper-evident stabilization. Finally, we point out how tamper-evident stabilization can effectively be used to provide tradeoff between fault-prevention and fault tolerance.

Keywords

  • Self-stabilization
  • reactive systems
  • adversary
  • formal methods

Download conference paper PDF

References

  1. Arora, A.: Efficient reconfiguration of trees: A case study in methodical design of nonmasking fault-tolerant programs. In: Langmaack, H., de Roever, W.-P., Vytopil, J. (eds.) FTRTFT 1994 and ProCoS 1994. LNCS, vol. 863, pp. 110–127. Springer, Heidelberg (1994)

    CrossRef  Google Scholar 

  2. Arora, A., Gouda, M., Varghese, G.: Constraint satisfaction as a basis for designing nonmasking fault-tolerant systems. Journal of High Speed Networks 5(3), 293–306 (1996)

    Google Scholar 

  3. Arora, A., Gouda, M.G.: Closure and convergence: A foundation of fault-tolerant computing. IEEE Transactions on Software Engineering 19(11), 1015–1027 (1993)

    CrossRef  Google Scholar 

  4. Beauquier, J., Kekkonen-Moneta, S.: On ftss-solvable distributed problems. In: WSS, pp. 64–79 (1997)

    Google Scholar 

  5. Bonakdarpour, B., Kulkarni, S.S.: Compositional verification of fault-tolerant real-time programs. In: EMSOFT, pp. 29–38 (2009)

    Google Scholar 

  6. Bonakdarpour, B., Kulkarni, S.S.: On the complexity of synthesizing relaxed and graceful bounded-time 2-phase recovery. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 660–675. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  7. Bonakdarpour, B., Kulkarni, S.S.: Active stabilization. In: Défago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol. 6976, pp. 77–91. Springer, Heidelberg (2011)

    CrossRef  Google Scholar 

  8. Burns, J.E., Gouda, M., Miller, R.E.: Stabilization and pseudo-stabilization. Distributed Computing 7(1), 35–42 (1993)

    CrossRef  MATH  Google Scholar 

  9. Devismes, S., Tixeuil, S., Yamashita, M.: Weak vs. self vs. probabilistic stabilization. In: ICDCS 2008, pp. 681–688 (2008)

    Google Scholar 

  10. Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control. Communications of the ACM 17(11), 643–644 (1974)

    CrossRef  MATH  Google Scholar 

  11. Dijkstra, E.W.: A Discipline of Programming. Prentice-Hall (1990)

    Google Scholar 

  12. Dolev, S.: Self-Stabilization. MIT Press (2000)

    Google Scholar 

  13. Ebnenasir, A., Kulkarni, S.S.: Feasibility of stepwise design of multitolerant programs. TOSEM 21(1), 1–49 (2011)

    CrossRef  Google Scholar 

  14. Ghosh, S., Gupta, A.: An exercise in fault-containment: Self-stabilizing leader election. Information Processing Letters 59(5), 281–288 (1996)

    CrossRef  MathSciNet  MATH  Google Scholar 

  15. Gouda, M.: Elements of security: Closure, convergence, and protection. Information Processing Letters 77(2-4), 109–114 (2001); In honor of Edsger W. Dijkstra

    Google Scholar 

  16. Gouda, M.: The theory of weak stabilization. In: Datta, A.K., Herman, T. (eds.) WSS 2001. LNCS, vol. 2194, pp. 114–123. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  17. Hajisheykhi, R., Ebnenasir, A., Kulkarni, S.: Tamper-evident stabilization. Technical Report MSU-CSE-14-4 (June 2014)

    Google Scholar 

  18. Israeli, A., Jalfon, M.: Token management schemes and random walks yield self-stabilizing mutual exclusion. In: PODC, pp. 119–131 (1990)

    Google Scholar 

  19. Kulkarni, S., Arora, A.: Multitolerance in distributed reset. Chicago Journal of Theoretical Computer Science 1998(4) (December 1998)

    Google Scholar 

  20. Lie, D., Thekkath, C.A., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J.C., Horowitz, M.: Architectural support for copy and tamper resistant software. In: ASPLOS, pp. 168–177 (2000)

    Google Scholar 

  21. Malekpour, M.R.: A byzantine-fault tolerant self-stabilizing protocol for distributed clock synchronization systems. In: Datta, A.K., Gradinariu, M. (eds.) SSS 2006. LNCS, vol. 4280, pp. 411–427. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  22. Nesterenko, M., Arora, A.: Tolerance to unbounded byzantine faults. In: SRDS, pp. 22–31 (2002)

    Google Scholar 

  23. Sean, W.: Smith and Steve Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks 31(8), 831–860 (1999)

    CrossRef  Google Scholar 

  24. Suh, G.E., Clarke, D.E., Gassend, B., van Dijk, M., Devadas, S.: Aegis: architecture for tamper-evident and tamper-resistant processing. In: ICS, pp. 160–171 (2003)

    Google Scholar 

  25. Zhang, H., Arora, A.: Guaranteed fault containment and local stabilization in routing. Computer Networks 50(18), 3585–3607 (2006)

    CrossRef  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Computer Science and Engineering Department, Michigan State University, East Lansing, Michigan, 48824, USA

    Reza Hajisheykhi & Sandeep S. Kulkarni

  2. Department of Computer Science, Michigan Technological University, Houghton, Michigan, 49931, USA

    Ali Ebnenasir

Authors
  1. Reza Hajisheykhi
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Ali Ebnenasir
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Sandeep S. Kulkarni
    View author publications

    You can also search for this author in PubMed Google Scholar

Corresponding author

Correspondence to Reza Hajisheykhi .

Editor information

Editors and Affiliations

  1. Intelligent Systems , Utrecht University, Utrecht, Utrecht, The Netherlands

    Mehdi Dastani

  2. School of Computer Science, Reykjavik University, Reykjavik, Iceland

    Marjan Sirjani

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 IFIP International Federation for Information Processing

About this paper

Cite this paper

Hajisheykhi, R., Ebnenasir, A., Kulkarni, S.S. (2015). A Theory of Integrating Tamper Evidence with Stabilization. In: Dastani, M., Sirjani, M. (eds) Fundamentals of Software Engineering. FSEN 2015. Lecture Notes in Computer Science(), vol 9392. Springer, Cham. https://doi.org/10.1007/978-3-319-24644-4_6

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-319-24644-4_6

  • Published: 12 November 2015

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24643-7

  • Online ISBN: 978-3-319-24644-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

65.108.231.39

Not affiliated

Springer Nature

© 2023 Springer Nature