Critical Analysis of the Use of Redundancy to Achieve Survivability in the Presence of Malicious Attacks

Abstract : From the research on communication security one learns that, although redundancy has been utilized to achieve reliability, if the errors are caused maliciously, then the use of redundancy does not necessarily work. The goal is to adapt the lesson from the research on communication security to study when redundancy can and cannot be used to achieve survivability. Although this study was curtailed by the removal of funding, partial results were obtained for generalizing the attack to redundant computations of multiple inputs and creating an algorithm to identify the most critical tasks.