Scalable byzantine fault-tolerant state-machine replication on heterogeneous servers
When provided with more powerful or extra hardware, state-of-the-art Byzantine fault-
tolerant (BFT) replication protocols are unable to effectively exploit the additional computing …
tolerant (BFT) replication protocols are unable to effectively exploit the additional computing …
[引用][C] Restart-Rollback: A Fault model for distributed systems with persistent state
P Druschel - 2022
Hybrids on steroids: SGX-based high performance BFT
With the advent of trusted execution environments provided by recent general purpose
processors, a class of replication protocols has become more attractive than ever: Protocols …
processors, a class of replication protocols has become more attractive than ever: Protocols …
Resilient and Secure Programmable System-on-Chip Accelerator Offload
Computational offload to hardware accelerators is gaining traction due to increasing
computational demands and efficiency challenges. Programmable hardware, like FPGAs …
computational demands and efficiency challenges. Programmable hardware, like FPGAs …
[PDF][PDF] A Byzantine Fault-Tolerant Key-Value Store for Safety-Critical Distributed Real-Time Systems
M Appel, A Gujarati, BB Brandenburg - CERTS, 2017 - iijlab.net
From modern cars to airplanes to industrial plants, many applications that must execute in a
timely manner are deployed on distributed systems. In case of safety-critical applications …
timely manner are deployed on distributed systems. In case of safety-critical applications …
A high-throughput byzantine fault-tolerant protocol
N KNEzEVIC - 2012 - infoscience.epfl.ch
State-machine replication (SMR) is a software technique for tolerating failures and for
providing high availability in large-scale systems, through the use of commodity hardware. A …
providing high availability in large-scale systems, through the use of commodity hardware. A …
Sok: Understanding the prevailing security vulnerabilities in trustzone-assisted tee systems
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
(TEEs) built with Arm TrustZone for the protection of security-critical applications (eg, DRM) …
Resilient and Secure Programmable System-on-Chip Accelerator Offload
Computational offload to hardware accelerators is gaining traction due to increasing
computational demands and efficiency challenges. Programmable hardware, like FPGAs …
computational demands and efficiency challenges. Programmable hardware, like FPGAs …
Vulnerability Analysis of Time Synchronization in Automotive Ethernet
R Kakade, J Chou, S Torcato - arXiv preprint arXiv:2208.11878, 2022 - arxiv.org
The operation of many network communication protocols require accurate time
synchronization between nodes. In the automotive space, IEEE 802.3 bw (commonly …
synchronization between nodes. In the automotive space, IEEE 802.3 bw (commonly …
[PDF][PDF] Fault tolerance techniques for scalable computing
The largest systems in the world today already scale to hundreds of thousands of cores. With
plans under way for exascale systems to emerge within the next decade, we will soon have …
plans under way for exascale systems to emerge within the next decade, we will soon have …