Byzantine fault-tolerant state-machine replication from a systems perspective

T Distler - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Byzantine fault-tolerant (BFT) state-machine replication makes it possible to design systems
that are resilient against arbitrary faults, a requirement considered crucial for an increasing …

Byzantine consensus in asynchronous message-passing systems: a survey

M Correia, GS Veronese, NF Neves… - … Journal of Critical …, 2011 - inderscienceonline.com
Consensus is a classical distributed systems problem with both theoretical and practical
interest. Asynchronous Byzantine consensus is currently at the core of some solutions for the …

Efficient byzantine fault-tolerance

GS Veronese, M Correia, AN Bessani… - IEEE Transactions …, 2011 - ieeexplore.ieee.org
We present two asynchronous Byzantine fault-tolerant state machine replication (BFT)
algorithms, which improve previous algorithms in terms of several metrics. First, they require …

Challenges in real-time virtualization and predictable cloud computing

M García-Valls, T Cucinotta, C Lu - Journal of Systems Architecture, 2014 - Elsevier
Cloud computing and virtualization technology have revolutionized general-purpose
computing applications in the past decade. The cloud paradigm offers advantages through …

Highly available intrusion-tolerant services with proactive-reactive recovery

P Sousa, AN Bessani, M Correia… - … on Parallel and …, 2009 - ieeexplore.ieee.org
In the past, some research has been done on how to use proactive recovery to build
intrusion-tolerant replicated systems that are resilient to any number of faults, as long as …

The Bedrock of Byzantine Fault Tolerance: A Unified Platform for {BFT} Protocols Analysis, Implementation, and Experimentation

MJ Amiri, C Wu, D Agrawal, A El Abbadi… - … USENIX Symposium on …, 2024 - usenix.org
Byzantine Fault-Tolerant (BFT) protocols cover a broad spectrum of design dimensions from
infrastructure settings, such as the communication topology, to more technical features, such …

[图书][B] Principles of ad-hoc networking

M Barbeau, E Kranakis - 2007 - books.google.com
Principles of Ad Hoc Networking presents a systematic introduction to the fundamentals of
ad hoc networks. An ad-hoc network is a small network, especially one with wireless or …

EBAWA: Efficient Byzantine agreement for wide-area networks

GS Veronese, M Correia, AN Bessani… - 2010 IEEE 12th …, 2010 - ieeexplore.ieee.org
The popularity of wide-area computer services has generated a compelling need for efficient
algorithms that provide high reliability. Byzantine fault-tolerant (BFT) algorithms can be used …

Proactive obfuscation

T Roeder, FB Schneider - ACM Transactions on Computer Systems …, 2010 - dl.acm.org
Proactive obfuscation is a new method for creating server replicas that are likely to have
fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate …

The CRUTIAL way of critical infrastructure protection

AN Bessani, P Sousa, M Correia… - IEEE Security & …, 2008 - ieeexplore.ieee.org
Critical infrastructures such as the power grid are essentially physical processes controlled
by computers connected by networks. They're usually as vulnerable as any other …