due to this artical
Linux bugs are expoitable for ca. 1-2 years, until they are fixed.
Selfsecure Sytems are running redudant subsystems....
Will it be possible to run to VM's in parallel on the "same task"?
The technology of this VM's are 100% idenpendet (no parts of the coding is a copy of each other).
The command is only 100% clean, if both instances will do the same and so it is executed and otherwise blocked and logged.
Would this work?
Which VM will be the counterpart to the standard Linux Templates?
E.g. Would it possible to match up Win-VM and Linux-VM?
(Why this will not work for internet browsing for example?)
Kind Regards
yes you are right, if more that 50% are corrupt and well coordinated - you get locked down via this "insider-threats".
But if you use really independent teams and perhaps you have some cover-agents running around, as long they are not coordinated or not the majority of the parallel independent channels to process, you will be able to make a simple black-box checking.
In my opinion, this can even help exactly for the trusted BIOS-boot-chain. If 4 independent teams come to the same conclusion, even if you need again and again many changes and new updates due to better hardware support - if they make a clean job, all will finish in the same result.
This fight-system as had no overruling at all in its lifetime, so the reliability or up time was pretty high, compared to other IT-solutions.
Also in the maintenance you can calculate, how you can increase the up time in critical systems with redundancy.
Kind Regards
Here are also quite a bunch of self-healing engineering, if you like to setup a self-secure system...
p24
http://cui.unige.ch/~dimarzo/papers/JAMT.pdf
Other call it reconciliation in the IT, if you check up to techs against each other.
Kind Regards
Redundancy Management Technique for Space Shuttle Computers:
The calculation of the same outputs by each critical computer and the synchronization of inputs are used to provide the means of achieving total failure coverage of flight-critical functions for a small computational
resource and hardware cost.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.136.9216&rep=rep1&type=pdf
Why, the mission-critical functions of any avionic calculation, might be in practice so much different from a mission critical encryption - might not help to overcome all this human-factor-errors of buggy code?
Kind Regards