Askemos 2010
home · features · download · bugs


A system is called "intrusion resistant", if it, as a whole, continues to adhere to it's predifined rules even in case of a part of the system components violate these rules (accidentally or by malicious intent).

The aim of intrusion resistance is to counter-ballance for the consequences of continued operation of an embraced device under violation of normaly system-guaranted assumtions (e.g., forged data, access rights).

Known ways to achieve that goal are tamper proofed hardware and systems based on ByzantineAgreement.

Remark: Eventually there is no such thing like tamper proofed hardware, just more complication to do so.

last modification: Sun, 12 Dec 2010 15:56:36 +0100
authors: jfw,
document identifier: Aba8e8a6ee70c1ffdde65d96b6e5623bf
delivered to public at Sat, 15 Aug 2020 00:50:26 +0200
short comments


pdf :: context view


21 Sep 2011
12 Dez 2010 AskemosAbout
12 Dez 2010 AskemosTopMenu
12 Dez 2010 InCorruptible
12 Dez 2010 ByzantineAgreement
12 Dez 2010 IntrusionResistant
11 Dez 2010 template
11 Dez 2010 metasystems


home · features · download · bugs