Malicious-and Accidental-Fault Tolerance for Internet Applications
IST Research Project IST-1999-11583
1 January 2000 - 28 February 2003

Check out a summary of the project, or browse through the original project proposal.

MAFTIA involved experts from 5 countries and 6 organisations. The Industrial Advisory Board provided valuable feedback on the work of the project.

Research was organised into six workpackages.

Find out more about the key scientific results and achievements, and the benefits of this research collaboration.




Newcastle
Brian Randell and Robert Stroud were the principal researchers at Newcastle.
Publications...



Lisboa
Paulo Veríssimo and Nuno Ferreira Neves led investigations at Lisboa.
Publications...



QinetiQ
QinetiQ's research was led by Colin O'Halloran and Sadie Creese.
Publications...



Saarland
Birgit Pfitzmann (now at IBM Zurich), Michael Steiner (now at IBM Thomas Watson), and André Adelsbach led the research at Saarland.
Publications...



LAAS-CNRS
Research at LAAS was led by David Powell and Yves Deswarte.
Publications...



IBM Zurich
Michael Waidner, Marc Dacier (now at Institut Eurécom), Andreas Wespi and Christian Cachin led the work at IBM Zurich.
Publications...

IBM Zurich: Publications

This is a list of MAFTIA-related publications from IBM Zurich.

Backes, M. and Cachin, C., Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries
In Proceedings of the International Conference on Dependable Systems and Networks (DSN-2003), June 2003
Available from http://www.zurich.ibm.com/~cca/papers/hybrid.pdf

Cachin, C., Modeling complexity in secure distributed computing
In André Schiper, Alexander A. Shvartsman, Hakim Weatherspoon, and Ben Y. Zhao (eds), Future Directions in Distributed Computing, Lecture Notes in
Computer Science, Vol: 2584, pp 57-61. Springer, 2003.
Available from http://www.zurich.ibm.com/~cca/papers/fudico.pdf

C. Cachin, K. Kursawe, and V. Shoup, Random oracles in Constantinople: practical asynchronous Byzantine agreement using cryptography
In Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing, Portland, Oregon, July 2000
pp 123-132. ACM Press. 2000
Available from http://www.zurich.ibm.com/~cca/papers/abba.pdf

K. Kursawe and V. Shoup, Optimistic asynchronous atomic broadcast
Report 2001/022, Cryptology ePrint Archive, March 2001

C. Cachin , K. Kursawe , F. Petzold and V. Shoup, Secure and Efficient Asynchronous Broadcast Protocols
In Proceedings of Advances in Cryptology: CRYPTO 2001, J. Kilian (ed), pp. 524-541
Lecture Notes in Computer Science 2139, Springer 2001
Available from http://eprint.iacr.org/2001/006

C. Cachin, Distributing trust on the Internet
In Proceedings of the Intl. Conference on Dependable Systems and Networks (DSN-2001), July 2001 pp. 183-192
Available from http://www.zurich.ibm.com/~cca/papers/dti.pdf

C. Cachin and J. Poritz, Secure Intrusion Tolerant Replication on the Internet
In Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), Washington, D.C. (USA), 23-26 June 2002, pp. 167-176
Available from http://www.zurich.ibm.com/~cca/papers/sintra.pdf

C. Cachin , K. Kursawe , A. Lysyanskaya , and R. Strobl, Asynchronous Verifiable Secret Sharing and Proactive Crypto Systems
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2002, pp. 88-97
Available from http://www.zurich.ibm.com/~cca/papers/ap.pdf

K. Kursawe, Asynchronous Byzantine Group Communication
In Proceedings of the Workshop on Reliable P2P Distributed Systems (RPPDS 2002) IEEE Computer Society Press, October 2002, pp 352-357

K. Kursawe, Optimistic Byzantine Agreement
In Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), October 2002, pp 262-267
IEEE Computer Society Press

D. Alessandri, Using Rule-Base Activity Descriptions to Evaluate Intrusion-Detection Systems
In Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection (RAID 2000), Toulouse, October 2000
Lecture Notes in Computer Science 1907, Springer-Verlag, pp. 183-196
Available from http://www.raid-symposium.org/

K. Julisch, Dealing with False Positives in Intrusion Detection (extended abstract)
In Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection (RAID 2000), Toulouse, October 2000
Available from http://www.raid-symposium.org/ [ presentation ] [ abstract ]

H. Debar and A. Wespi, Aggregation and Correlation of Intrusion-Detection Alerts
In Proceedings of Recent Advances in Intrusion Detection (RAID 2001), W. Lee, L. Mé, A. Wespi (eds.), pp. 85-103
LNCS 2212, Springer, Berlin, Heidelberg, 2001

K. Julisch, Mining Alarm Clusters to Improve Alarm Handling Efficiency
In Proceedings of the 17th Annual Computer Security Applications Conf., New Orleans, LA, December 10-14, 2001

Kursawe, K. and Shoup, V., Optimistic Asynchronous Atomic Broadcast, Cryptology ePrint Archive, Report 2001/022, 2001
Available from http://eprint.iacr.org/2001/022/

K. Julisch, Data Mining for Intrusion Detection - A Critical Review
In Applications of Data Mining in Computer Security, D. Barbera and S. Jajodia (eds.)
Kluwer Academic Publishers, Boston, 2002

With Saarland University

B. Pfitzmann, M. Schunter, and M. Waidner, Cryptographic Security of Reactive Systems
In Proceedings of the Workshop on Secure Architectures and Information Flow, Royal Holloway, University of London, December 1-3, 1999
Electronic Notes in Theoretical Computer Science (ENTCS) 32, 2000
Available from Elsevier Press

B. Pfitzmann, M. Schunter, M. Waidner, Secure Reactive Systems
IBM Research Report RZ 3206 (#93252) 02/14/00, IBM Research Division, Zürich, February 2000
Available from http://www.semper.org

B. Pfitzmann, M. Schunter, M. Waidner, Provably Secure Certified Mail
IBM Research Report RZ 3207 (#93253), 02/14/00, IBM Research Division, Zurich, August 2000
Available from http://www.semper.org

B. Pfitzmann, M. Waidner, Composition and Integrity Preservation of Secure Reactive Systems
In Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, November 2000, pp. 245-254, ACM Press, New York 2000
Available from http://www.semper.org

B. Pfitzmann, M. Waidner, A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
IBM Research Report RZ 3304 (#93350) 12/11/2000, IBM Research Division, Zurich, December 2000
Available from http://eprint.iacr.org/2000/066.ps.gz

B. Pfitzmann, M. Waidner, A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, USA, 2001, pp 184- 200 (a later and less detailed version of the above)

M. Backes, B. Pfitzmann, M. Steiner, and M. Waidner, Polynomial Fairness and Liveness
In Proceedings of the 15th Computer Security Foundations Workshop (CFSW 2002), Cape Breton, Nova Scotia, 2002, IEEECSP, pp 160-174

M. Backes, C. Jacobi, and B. Pfitzmann, Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation
In Proceedings of Formal Methods Europe 2002 (FME '02), pp.310-359
Lecture Notes in Computer Science 2391, Springer-Verlag, Berlin, 2002

All Partners

D. Powell, A. Adelsbach, C. Cachin, S. Creese, M. Dacier, Y. Deswarte, T. McCutcheon, N. Neves, B. Pfitzmann, B. Randell, R. Stroud, P. Veríssimo, M. Waidner, MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications)
In Sup. of the Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN2001), Göteborg (Sweden), 1-4 July 2001, pp. D-32-D-35