Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1404014.1404038guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Diverse replication for single-machine Byzantine-fault tolerance

Published: 22 June 2008 Publication History
  • Get Citation Alerts
  • Abstract

    New single-machine environments are emerging from abundant computation available through multiple cores and secure virtualization. In this paper, we describe the research challenges and opportunities around diversified replication as a method to increase the Byzantine-fault tolerance (BFT) of single-machine servers to software attacks or errors. We then discuss the design space of BFT protocols enabled by these new environments.

    References

    [1]
    Intel trusted execution technology. http://www.intel. com/technology/security.
    [2]
    Tera-scale computing research program. http:// techresearch.intel.com/articles/Tera-Scale/ 1421.htm.
    [3]
    Xen. http://xen.org.
    [4]
    M. Abd-El-Malek, G. Ganger, G. Goodson, M. Reiter, and J. Wylie. Fault-scalable Byzantine fault-tolerant services. In SOSP, 2005.
    [5]
    Advanced Micro Devices. AMD64 architecture programmer's manual: Volume 2: System programming. 2005.
    [6]
    K. Asanovic, R. Bodik, B. C. Catanzaro, J. J. Gebis, P. Husbands, K. Keutzer, D. A. Patterson, W. L. Plishker, J. Shalf, S.W. Williams, and K. A. Yelick. The landscape of parallel computing research: A view from berkeley. Technical Report UCB/EECS-2006-183, UC Berkeley, 2006.
    [7]
    T. Austin. DIVA: A reliable substrate for deep submicron microarchitecture design. In Symposium on Microarchitecture, 2001.
    [8]
    A. Avizienis and L. Chen. On the implementation of n-version programming for softwae fault-tolerance during program execution. In International Computer Software and Applications Conference , 1977.
    [9]
    E. Barrantes, D. Ackley, S. Forrest, T. Palmer, D. Stefanovic, and D. Zovi. Intrusion detection: Randomized instruction set emulation to disrupt binary code injection attacks. In ACM CCS, 2003.
    [10]
    J. F. Bartlett. A NonStop kernel. In SOSP, 1981.
    [11]
    R. C. Baumann. Soft errors in commercial semiconductor technology: Overview and scaling trends. In IEEE Reliability Physics Tutorial Notes, Reliability Fundamentals, 2002.
    [12]
    D. Bernick, B. Bruckert, P. D. Vigna, D. Garcia, R. Jardine, J. Klecka, and J. Smullen. Nonstop advanced architecture. In DSN, 2005.
    [13]
    S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In USENIX Security, 2003.
    [14]
    A. Borg, W. Blau, W. Graetsch, F. Herrmann, and W. Oberle. Fault tolerance under UNIX. ACM Trans. Comput. Syst., 7(1), 1989.
    [15]
    R. E. Carpenter. Comparing Multi-Core Processors for Server Virtualization. IT@Intel, Aug. 2007. http://www.intel. com/it/pdf/multicore_virtualization.pdf.
    [16]
    M. Castro and B. Liskov. Practical byzantine fault tolerance and proactive recovery. ACM TOCS, 20(4), 2002.
    [17]
    M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. In Technical Report CMU-CS-02-197, CMU, 2002.
    [18]
    B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested append-only memory: Making adversaries stick to their word. In SOSP, 2007.
    [19]
    J. Cowling, D. Myers, B. Liskov, R. Rodrigues, and L. Shrira. HQ replication: A hybrid quorum protocol for Byzantine fault tolerance. In OSDI, 2006.
    [20]
    B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-variant systems: A secretless framework for security through diversity. In USENIX Security, 2006.
    [21]
    M. Fähndrich, M. Aiken, C. Hawblitzel, O. Hodson, G. C. Hunt, J. R. Larus, and S. Levi. Language Support for Fast and Reliable Message-based Communication in Singularity OS. In EuroSys, 2006.
    [22]
    S. Forrest, A. Somayaji, and D. Ackley. Building diverse computer systems. In HotOS, 1997.
    [23]
    C. Ho, R. van Renesse, M. Bickford, and D. Dolev. Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures. In NSDI, 2008.
    [24]
    G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In ACM CCS, 2003.
    [25]
    R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong. Zyzzyva: Speculative Byzantine fault tolerance. In SOSP, 2007.
    [26]
    L. Lamport. The part-time parliament. In ACM TOCS, 1998.
    [27]
    J. Pool, I. S. K. Wong, and D. Lie. Relaxed determinism: Making redundant execution on multiprocessors practical. In HotOS, 2007.
    [28]
    F. Qin, J. Tucek, Jagadeesan, Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies - a safe method for surviving software failures. In SOSP, 2005.
    [29]
    T. Rabin. A simplified approach to threshold and proactive RSA. In CRYPTO, 1998.
    [30]
    J. Reynolds, J. Just, E. Lawson, L. Clough, R. Maglich, and K. Levitt. The design and implementation of an intrusion tolerant system. In Foundations of Intrusion Tolerant Systems, 2003.
    [31]
    R. Rodrigues, M. Castro, and B. Liskov. BASE: Using abstraction to improve fault tolerance. In SOSP, 2001.
    [32]
    B. Vandiver, H. Balakrishnan, B. Liskov, and S. Madden. Tolerating Byzantine Faults in Database Systems using Commit Barrier Scheduling. In SOSP, 2007.
    [33]
    C. Weaver and T. Austin. A fault tolerant approach to microprocessor design. In DSN, 2001.
    [34]
    J. Xu, Z. Kalbarczyk, and R. Iyer. Transparent runtime randomization for security. In SRDS, 2003.
    [35]
    J. Yin, J.-P. Martin, A. Venkataramani, L. Alvisi, and M. Dahlin. Separating Agreement from Execution for Byzantine Fault Tolerant Services. In SOSP, 2003.
    [36]
    A. R. Yumerefendi, B. Mickle, and L. P. Cox. TightLip: Keeping applications from spilling the beans. In NSDI, 2007.
    [37]
    Y. Zhou, D. Marinov, W. Sanders, C. Zilles, M. d'Amorim, S. Lauterburg, R. M. Lefever, and J. Tucek. Delta execution for software reliability. In HotDep, 2007.

    Cited By

    View all
    • (2019)The Impact of RDMA on AgreementProceedings of the 2019 ACM Symposium on Principles of Distributed Computing10.1145/3293611.3331601(409-418)Online publication date: 16-Jul-2019
    • (2018)Experimental validation of the suitability of virtualization-based replication for fault tolerance in real-time control of electric gridsProceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement10.1145/3239235.3267429(1-4)Online publication date: 11-Oct-2018
    • (2016)LDXACM SIGARCH Computer Architecture News10.1145/2980024.287239544:2(503-515)Online publication date: 25-Mar-2016
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ATC'08: USENIX 2008 Annual Technical Conference
    June 2008
    432 pages

    Publisher

    USENIX Association

    United States

    Publication History

    Published: 22 June 2008

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)The Impact of RDMA on AgreementProceedings of the 2019 ACM Symposium on Principles of Distributed Computing10.1145/3293611.3331601(409-418)Online publication date: 16-Jul-2019
    • (2018)Experimental validation of the suitability of virtualization-based replication for fault tolerance in real-time control of electric gridsProceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement10.1145/3239235.3267429(1-4)Online publication date: 11-Oct-2018
    • (2016)LDXACM SIGARCH Computer Architecture News10.1145/2980024.287239544:2(503-515)Online publication date: 25-Mar-2016
    • (2016)LDXACM SIGPLAN Notices10.1145/2954679.287239551:4(503-515)Online publication date: 25-Mar-2016
    • (2016)LDXProceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/2872362.2872395(503-515)Online publication date: 25-Mar-2016
    • (2015)Dual Execution for On the Fly Fine Grained Execution ComparisonACM SIGARCH Computer Architecture News10.1145/2786763.269439443:1(325-338)Online publication date: 14-Mar-2015
    • (2015)Dual Execution for On the Fly Fine Grained Execution ComparisonACM SIGPLAN Notices10.1145/2775054.269439450:4(325-338)Online publication date: 14-Mar-2015
    • (2015)Dual Execution for On the Fly Fine Grained Execution ComparisonProceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/2694344.2694394(325-338)Online publication date: 14-Mar-2015
    • (2015)A lightweight software fault-tolerance system in the cloud environmentConcurrency and Computation: Practice & Experience10.1002/cpe.319027:12(2982-2998)Online publication date: 25-Aug-2015
    • (2014)Machine fault tolerance for reliable datacenter systemsProceedings of 5th Asia-Pacific Workshop on Systems10.1145/2637166.2637235(1-7)Online publication date: 25-Jun-2014
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media