Challenging Malicious Inputs With Fault Tolerance Techniques presented at Blackhat Europe 2007

by Bruno Luiz,

Tags: Security

Summary : We humans, being imperfect creatures, create imperfect software. This presentation is regarding implementation of software fault tolerance techniques to recover the effects of malicious inputs. Most of the attacks that cause flaws to software appears of malicious inputs that are introduced by a human with the malicious objective of causing harm to the system. In the research, we examine the type of recovery used in fault tolerant software, and the types of redundancy used in software fault tolerance techniques.