Constrained Adversary Models
Temporal correlation
- Do past failures “imply” likely future failures?
Spatial correlation
- Do failures make “nearby” locations vulnerable?
Resource limitation
- How many processors can be corrupted?
- How much traffic can the adversary generate?
Speed of propagation
- How quickly does the failure pattern change?