BFT protocol forensics

P Sheng, G Wang, K Nayak, S Kannan… - Proceedings of the 2021 …, 2021 - dl.acm.org
Byzantine fault-tolerant (BFT) protocols allow a group of replicas to come to consensus even
when some of the replicas are Byzantine faulty. There exist multiple BFT protocols to …

Making byzantine consensus live

M Bravo, G Chockler, A Gotsman - Distributed Computing, 2022 - Springer
Partially synchronous Byzantine consensus protocols typically structure their execution into
a sequence of views, each with a designated leader process. The key to guaranteeing …

Secure network provenance

W Zhou, Q Fei, A Narayan, A Haeberlen… - Proceedings of the …, 2011 - dl.acm.org
This paper introduces secure network provenance (SNP), a novel technique that enables
networked systems to explain to their operators why they are in a certain state--eg, why a …

Understanding, detecting and localizing partial failures in large system software

C Lou, P Huang, S Smith - 17th USENIX Symposium on Networked …, 2020 - usenix.org
Partial failures occur frequently in cloud systems and can cause serious damage including
inconsistency and data loss. Unfortunately, these failures are not well understood. Nor can …

Polygraph: Accountable byzantine agreement

P Civit, S Gilbert, V Gramoli - 2021 IEEE 41st International …, 2021 - ieeexplore.ieee.org
In this paper, we introduce Polygraph, the first accountable Byzantine consensus algorithm.
If among n users t<n/3 are malicious then it ensures consensus; otherwise (if t≧n/3), it …

The availability-accountability dilemma and its resolution via accountability gadgets

J Neu, EN Tas, D Tse - … Conference on Financial Cryptography and Data …, 2022 - Springer
For applications of Byzantine fault tolerant (BFT) consensus protocols where the participants
are economic agents, recent works highlighted the importance of accountability: the ability to …

Capturing and enhancing in situ system observability for failure detection

P Huang, C Guo, JR Lorch, L Zhou… - 13th USENIX Symposium …, 2018 - usenix.org
Real-world distributed systems suffer unavailability due to various types of failure. But,
despite enormous effort, many failures, especially gray failures, still escape detection. In this …

Blockchain bribing attacks and the efficacy of counterincentives

D Karakostas, A Kiayias, T Zacharias - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
We analyze bribing attacks in Proof-of-Stake distributed ledgers from a game theoretic
perspective. In bribing attacks, an adversary offers participants a reward in exchange for …

Liveness and latency of Byzantine state-machine replication

M Bravo, G Chockler, A Gotsman - Distributed Computing, 2024 - Springer
Byzantine state-machine replication (SMR) ensures the consistency of replicated state in the
presence of malicious replicas and lies at the heart of the modern blockchain technology …

[HTML][HTML] As easy as ABC: Optimal (A) ccountable (B) yzantine (C) onsensus is easy!

P Civit, S Gilbert, V Gramoli, R Guerraoui… - Journal Of Parallel And …, 2023 - Elsevier
In a non-synchronous system with n processes, no t 0-resilient (deterministic or probabilistic)
Byzantine consensus protocol can prevent a disagreement among correct processes if the …