Byzantine fault-tolerant state-machine replication from a systems perspective
T Distler - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Byzantine fault-tolerant (BFT) state-machine replication makes it possible to design systems
that are resilient against arbitrary faults, a requirement considered crucial for an increasing …
that are resilient against arbitrary faults, a requirement considered crucial for an increasing …
Byzantine consensus in asynchronous message-passing systems: a survey
Consensus is a classical distributed systems problem with both theoretical and practical
interest. Asynchronous Byzantine consensus is currently at the core of some solutions for the …
interest. Asynchronous Byzantine consensus is currently at the core of some solutions for the …
Efficient byzantine fault-tolerance
GS Veronese, M Correia, AN Bessani… - IEEE Transactions …, 2011 - ieeexplore.ieee.org
We present two asynchronous Byzantine fault-tolerant state machine replication (BFT)
algorithms, which improve previous algorithms in terms of several metrics. First, they require …
algorithms, which improve previous algorithms in terms of several metrics. First, they require …
Challenges in real-time virtualization and predictable cloud computing
Cloud computing and virtualization technology have revolutionized general-purpose
computing applications in the past decade. The cloud paradigm offers advantages through …
computing applications in the past decade. The cloud paradigm offers advantages through …
Highly available intrusion-tolerant services with proactive-reactive recovery
In the past, some research has been done on how to use proactive recovery to build
intrusion-tolerant replicated systems that are resilient to any number of faults, as long as …
intrusion-tolerant replicated systems that are resilient to any number of faults, as long as …
The Bedrock of Byzantine Fault Tolerance: A Unified Platform for {BFT} Protocols Analysis, Implementation, and Experimentation
Byzantine Fault-Tolerant (BFT) protocols cover a broad spectrum of design dimensions from
infrastructure settings, such as the communication topology, to more technical features, such …
infrastructure settings, such as the communication topology, to more technical features, such …
[图书][B] Principles of ad-hoc networking
M Barbeau, E Kranakis - 2007 - books.google.com
Principles of Ad Hoc Networking presents a systematic introduction to the fundamentals of
ad hoc networks. An ad-hoc network is a small network, especially one with wireless or …
ad hoc networks. An ad-hoc network is a small network, especially one with wireless or …
EBAWA: Efficient Byzantine agreement for wide-area networks
GS Veronese, M Correia, AN Bessani… - 2010 IEEE 12th …, 2010 - ieeexplore.ieee.org
The popularity of wide-area computer services has generated a compelling need for efficient
algorithms that provide high reliability. Byzantine fault-tolerant (BFT) algorithms can be used …
algorithms that provide high reliability. Byzantine fault-tolerant (BFT) algorithms can be used …
Proactive obfuscation
T Roeder, FB Schneider - ACM Transactions on Computer Systems …, 2010 - dl.acm.org
Proactive obfuscation is a new method for creating server replicas that are likely to have
fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate …
fewer shared vulnerabilities. It uses semantics-preserving code transformations to generate …
The CRUTIAL way of critical infrastructure protection
Critical infrastructures such as the power grid are essentially physical processes controlled
by computers connected by networks. They're usually as vulnerable as any other …
by computers connected by networks. They're usually as vulnerable as any other …