skip to main content
10.1145/3528535.3531516acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

SplitBFT: Improving Byzantine Fault Tolerance Safety Using Trusted Compartments

Published: 24 October 2022 Publication History

Abstract

Byzantine fault-tolerant agreement (BFT) in a partially synchronous system usually requires 3f + 1 nodes to tolerate f faulty replicas. Due to their high throughput and finality property, BFT algorithms build the core of recent permissioned blockchains. As a complex and resource-demanding infrastructure, multiple cloud providers have started offering Blockchain-as-a-Service. This eases the deployment of permissioned blockchains but places the cloud provider in a central controlling position, thereby questioning blockchains' fault tolerance and decentralization properties and their underlying BFT algorithm. This paper presents SplitBFT, a new way to utilize trusted execution technology (TEEs), such as Intel SGX, to harden the safety and confidentiality guarantees of BFT systems, thereby strengthening the trust in could-based deployments of permissioned blockchains. Deviating from standard assumptions, SplitBFT acknowledges that code protected by trusted execution may fail. We address this by splitting and isolating the core logic of BFT protocols into multiple compartments resulting in a more resilient architecture. We apply SplitBFT to the traditional practical byzantine fault tolerance algorithm (PBFT) and evaluate it using SGX. Our results show that SplitBFT adds only a reasonable overhead compared to the non-compartmentalized variant.

References

[1]
Ittai Abraham, Guy Golan-Gueta, Dahlia Malkhi, Lorenzo Alvisi, Ramakrishna Kotla, and Jean-Philippe Martin. 2017. Revisiting Fast Practical Byzantine Fault Tolerance. (2017). https://doi.org/10.48550/arXiv.1712.01367 arXiv:hep-ph/9609357
[2]
Amazon. 2022. Amazon Managed Blockchain. https://aws.amazon.com/managed-blockchain/ Retrieved Mai 9, 2022 from
[3]
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, and Jason Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the Thirteenth EuroSys Conference (Porto, Portugal) (EuroSys '18). ACM, New York, NY, USA, Article 30, 15 pages. https://doi.org/10.1145/3190508.3190538
[4]
Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, David Eyers, Rüdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (Savannah, GA, USA) (OSDI'16). USENIX Association, USA, 689–703.
[5]
Jean-Paul Bahsoun, Rachid Guerraoui, and Ali Shoker. 2015. Making BFT Protocols Really Adaptive. In 2015 IEEE International Parallel and Distributed Processing Symposium. IEEE, Hyderabad, India, 904–913. https://doi.org/10.1109/IPDPS.2015.21
[6]
Maurice Bailleu, Jörg Thalheim, Pramod Bhatotia, Christof Fetzer, Michio Honda, and Kapil Vaswani. 2019. SPEICHER: Securing LSM-Based Key-Value Stores Using Shielded Execution. In Proceedings of the 2019 USENIX Conference on Usenix Annual Technical Conference (Boston, MA, USA) (FAST'19). USENIX Association, USA, 173–190.
[7]
Shehar Bano, Alberto Sonnino, Andrey Chursin, Dmitri Perelman, and Dahlia Malkhi. 2020. Twins: White-Glove Approach for BFT Testing. (2020). https://doi.org/10.48550/arXiv.2004.10617 arXiv:2004.10617
[8]
Mathieu Baudet, Avery Ching, Andrey Chursin, George Danezis, François Garillot, Zekun Li, Dahlia Malkhi, Oded Naor, Dmitri Perelman, and Alberto Sonnino. 2019. State machine replication in the libra blockchain. The Libra Assn., Tech. Rep (2019).
[9]
Johannes Behl, Tobias Distler, and Rüdiger Kapitza. 2017. Hybrids on Steroids: SGX-Based High Performance BFT. In Proceedings of the Twelfth European Conference on Computer Systems (Belgrade, Serbia) (EuroSys '17). ACM, New York, NY, USA, 222–237. https://doi.org/10.1145/3064176.3064213
[10]
Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized Anonymous Payments from Bitcoin. In 2014 IEEE Symposium on Security and Privacy. IEEE, San Jose, California, 459–474. https://doi.org/10.1109/SP.2014.36
[11]
Christian Berger, Hans P. Reiser, and Alysson Bessani. 2021. Making Reads in BFT State Machine Replication Fast, Linearizable, and Live. In 2021 40th International Symposium on Reliable Distributed Systems (SRDS). IEEE, Chicago, IL, USA, 1–12. https://doi.org/10.1109/SRDS53918.2021.00010
[12]
Gaël Blanchemain. 2018. Azure BaaS. https://docs.nethereum.com/en/latest/azure/set-up-blockchain-on-azure/ Retrieved July 7, 2021 from
[13]
Marcus Brandenburger, Christian Cachin, Matthias Lorenz, and Rüdiger Kapitza. 2017. Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory. In 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26-29, 2017. IEEE, Denver, CO, USA, 157–168. https://doi.org/10.1109/DSN.2017.45
[14]
Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 9911008. https://www.usenix.org/conference/usenixsecurity18/presentation/bulck
[15]
Miguel Castro. 2001. Practical Byzantine Fault Tolerance. Ph.D. MIT. Also as Technical Report MIT-LCS-TR-817.
[16]
Miguel Castro and Barbara Liskov. 1999. Practical Byzantine Fault Tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation (New Orleans, Louisiana, USA) (OSDI '99). USENIX Association, USA, 173–186. https://dl.acm.org/doi/10.5555/296806.296824
[17]
Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, and Flavio D. Garcia. 2021. VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 699–716. https://www.usenix.org/conference/usenixsecurity21/presentation/chen-zitai
[18]
Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah Johnson, Ari Juels, Andrew Miller, and Dawn Song. 2019. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. In 2019 IEEE European Symposium on Security and Privacy (EuroS P). IEEE, Stockholm, Sweden, 185–200. https://doi.org/10.1109/EuroSP.2019.00023
[19]
Allen Clement, Flavio Junqueira, Aniket Kate, and Rodrigo Rodrigues. 2012. On the (Limited) Power of Non-Equivocation (PODC '12). ACM, New York, NY, USA, 301–308. https://doi.org/10.1145/2332432.2332490
[20]
Allen Clement, Manos Kapritsos, Sangmin Lee, Yang Wang, Lorenzo Alvisi, Mike Dahlin, and Taylor Riche. 2009a. Upright Cluster Services. In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles (Big Sky, Montana, USA) (SOSP '09). ACM, New York, NY, USA, 277–290. https://doi.org/10.1145/1629575.1629602
[21]
Allen Clement, Edmund Wong, Lorenzo Alvisi, Mike Dahlin, and Mirco Marchetti. 2009b. Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (Boston, Massachusetts) (NSDI'09). USENIX Association, USA, 153–168.
[22]
Tobias Cloosters, Michael Rodler, and Lucas Davi. 2020. TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA, USA, 841–858. https://www.usenix.org/conference/usenixsecurity20/presentation/cloosters
[23]
IBM Corp. 2018. Blockchain in retail solutions. https://www.ibm.com/blockchain/industries/retail Retrieved July 7, 2021 from
[24]
Intel Corporation. 2019. Confidential Computing Consortium. https://www.intel.com/content/www/us/en/security/confidential-computing.html Retrieved October 2, 2021 from
[25]
IBM Corporation. 2021. Research leading blockchain use cases. https://www.ibm.com/blockchain/use-cases/ Retrieved September 16, 2021 from
[26]
Victor Costan and Srinivas Devadas. 2016. Intel sgx explained. IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1–118.
[27]
Jérémie Decouchant, David Kozhaya, Vincent Rahli, and Jiangshan Yu. 2022. DAMYSUS: Streamlined BFT Consensus Leveraging Trusted Components. In Proceedings of the Seventeenth European Conference on Computer Systems (Rennes, France) (EuroSys '22). ACM, New York, NY, USA, 1–16. https://doi.org/10.1145/3492321.3519568
[28]
Fernando Dettoni, Lau Cheuk Lung, Miguel Correia, and Aldelir Fernando Luiz. 2013. Byzantine fault-tolerant state machine replication with twin virtual machines. In 2013 IEEE Symposium on Computers and Communications (ISCC). IEEE, Split, Croatia, 398–403. https://doi.org/10.1109/ISCC.2013.6754979
[29]
Diego Didona and Willy Zwaenepoel. 2019. Size-Aware Sharding for Improving Tail Latencies in in-Memory Key-Value Stores. In Proceedings of the 16th USENIX Conference on Networked Systems Design and Implementation (Boston, MA, USA) (NSDI'19). USENIX Association, USA, 79–93.
[30]
Tobias Distler, Ivan Popov, Wolfgang Schröder-Preikschat, Hans P Reiser, and Rüdiger Kapitza. 2011. SPARE: Replicas on Hold. In Proceedings of the 18th Network and Distributed System Security Symposium (NDSS '11). Internet Society, San Diego, California, USA, 407–420.
[31]
Miguel Garcia, Alysson Bessani, and Nuno Neves. 2019. Lazarus: Automatic Management of Diversity in BFT Systems. In Proceedings of the 20th International Middleware Conference (Davis, CA, USA) (Middleware '19). ACM, New York, NY, USA, 241–254. https://doi.org/10.1145/3361525.3361550
[32]
Guy Golan Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael Reiter, Dragos-Adrian Seredinschi, Orr Tamir, and Alin Tomescu. 2019. SBFT: A Scalable and Decentralized Trust Infrastructure. In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, Portland, OR, USA, 568–580. https://doi.org/10.1109/DSN.2019.00063
[33]
Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. 2020. Dumbo: Faster Asynchronous BFT Protocols. ACM, New York, NY, USA, 803–818. https://doi.org/10.1145/3372297.3417262
[34]
Apache Inc. 2022. Teaclave SGX SDK. https://github.com/apache/incubator-teaclave-sgx-sdk
[35]
Rüdiger Kapitza, Johannes Behl, Christian Cachin, Tobias Distler, Simon Kuhnle, Seyed Vahid Mohammadi, Wolfgang Schröder-Preikschat, and Klaus Stengel. 2012. CheapBFT: Resource-Efficient Byzantine Fault Tolerance. In Proceedings of the 7th ACM European Conference on Computer Systems (Bern, Switzerland) (EuroSys '12). ACM, New York, NY, USA, 295–308. https://doi.org/10.1145/2168836.2168866
[36]
Taehoon Kim, Joongun Park, Jaewook Woo, Seungheun Jeon, and Jaehyuk Huh. 2019. ShieldStore: Shielded In-Memory Key-Value Storage with SGX. In Proceedings of the Fourteenth EuroSys Conference 2019 (Dresden, Germany) (EuroSys '19). ACM, New York, NY, USA, Article 14, 15 pages. https://doi.org/10.1145/3302424.3303951
[37]
Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 1–19. https://doi.org/10.1109/SP.2019.00002
[38]
Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmund Wong. 2010. Zyzzyva: Speculative Byzantine Fault Tolerance. ACM Trans. Comput. Syst. 27, 4, Article 7 (jan 2010), 39 pages. 0734-2071 https://doi.org/10.1145/1658357.1658358
[39]
Tsung-Ting Kuo, Hyeon-Eui Kim, and Lucila Ohno-Machado. 2017. Blockchain distributed ledger technologies for biomedical and health care applications. Journal of the American Medical Informatics Association 24, 6 (2017), 1211–1220.
[40]
Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine Generals Problem. ACM Trans. Program. Lang. Syst. 4, 3 (jul 1982), 382–401. 0164-0925 https://doi.org/10.1145/357172.357176
[41]
Bijun Li, Nico Weichbrodt, Johannes Behl, Pierre-Louis Aublin, Tobias Distler, and Rüdiger Kapitza. 2018. Troxy: Transparent Access to Byzantine Fault-Tolerant Systems. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, Luxembourg, Luxembourg, 59–70. 2158-3927 https://doi.org/10.1109/DSN.2018.00019
[42]
Jinyuan Li and David Maziéres. 2007. Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems. In Proceedings of the 4th USENIX Conference on Networked Systems Design Implementation (Cambridge, MA) (NSDI'07). USENIX Association, USA, 10.
[43]
Jian Liu, Wenting Li, Ghassan O. Karame, and N. Asokan. 2019. Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing. IEEE Trans. Comput. 68, 1 (2019), 139–151. https://doi.org/10.1109/TC.2018.2860009
[44]
Shengyun Liu, Paolo Viotti, Christian Cachin, Vivien Quema, and Marko Vukolić. 2016. XFT: Practical Fault Tolerance beyond Crashes. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 485–500. https://www.usenix.org/conference/osdi16/technical-sessions/presentation/liu
[45]
Dahlia Malkhi, Kartik Nayak, and Ling Ren. 2019. Flexible Byzantine Fault Tolerance. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (London, United Kingdom) (CCS '19). ACM, New York, NY, USA, 1041–1053. https://doi.org/10.1145/3319535.3354225
[46]
J.-P. Martin and L. Alvisi. 2005. Fast Byzantine consensus. In 2005 International Conference on Dependable Systems and Networks (DSN'05). IEEE, Yokohama, Japan, 402–411. https://doi.org/10.1109/DSN.2005.48
[47]
Kenneth L. McMillan and Oded Padon. 2020. Ivy: A Multi-Modal Verification Tool for Distributed Algorithms. In Computer Aided Verification: 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21–24, 2020, Proceedings, Part II (Los Angeles, CA, USA). Springer-Verlag, Berlin, Heidelberg, 190–202. https://doi.org/10.1007/978-3-030-53291-8_12
[48]
Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Andre Martin, Christof Fetzer, and Mark Silberstein. 2018. Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks. In Proceedings of the 2018 USENIX Conference on Usenix Annual Technical Conference (Boston, MA, USA) (USENIX ATC '18). USENIX Association, USA, 227–239.
[49]
Daniel Porto, João Leitão, Cheng Li, Allen Clement, Aniket Kate, Flavio Junqueira, and Rodrigo Rodrigues. 2015. Visigoth Fault Tolerance. In Proceedings of the Tenth European Conference on Computer Systems (Bordeaux, France) (EuroSys '15). ACM, New York, NY, USA, Article 8, 14 pages. https://doi.org/10.1145/2741948.2741979
[50]
Ivan Puddu, Moritz Schneider, Miro Haller, and Srdjan Capkun. 2021. Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 663–680. https://www.usenix.org/conference/usenixsecurity21/presentation/puddu
[51]
Signe Rüsch, Kai Bleeke, and Rüdiger Kapitza. 2019. Themis: An Efficient and Memory-Safe BFT Framework in Rust: Research Statement. In Proceedings of the 3rd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers (Davis, CA, USA) (SERIAL '19). ACM, New York, NY, USA, 9–10. https://doi.org/10.1145/3366611.3368144
[52]
Mark Russinovich, Edward Ashton, Christine Avanessians, Miguel Castro, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Cédric Fournet, Matthew Kerner, Sid Krishna, Julien Maffre, Thomas Moscibroda, Kartik Nayak, Olya Ohrimenko, Felix Schuster, Roy Schwartz, Alex Shamis, Olga Vrousgou, and Christoph M. Wintersteiger. 2019. CCF: A Framework for Building Confidential Verifiable Replicated Services. Technical Report MSR-TR-2019-16. Microsoft. https://www.microsoft.com/en-us/research/publication/ccf-a-framework-for-building-confidential-verifiable-replicated-services/
[53]
Jaebaek Seo, Byoungyoung Lee, Seong Min Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, and Taesoo Kim. 2017. SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. In NDSS. Internet Society, San Diego, CA USA.
[54]
Ming-Wei Shih, Sangho Lee, Taesoo Kim, and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. In Network and Distributed System Security Symposium 2017 (NDSS'17) (network and distributed system security symposium 2017 (ndss'17) ed.). Internet Society, San Diego, CA USA. https://www.microsoft.com/en-us/research/publication/t-sgx-eradicating-controlled-channel-attacks-enclave-programs/
[55]
Brian Smith. 2022. ring. https://github.com/briansmith/ring
[56]
Chrysoula Stathakopoulou, Signe Rüsch, Marcus Brandenburger, and Marko Vukolić. 2021. Adding Fairness to Order: Preventing Front-Running Attacks in BFT Protocols using TEEs. In 2021 40th International Symposium on Reliable Distributed Systems (SRDS). IEEE, Chicago, IL, USA, 34–45. https://doi.org/10.1109/SRDS53918.2021.00013
[57]
Marcelo Taube, Giuliano Losa, Kenneth L. McMillan, Oded Padon, Mooly Sagiv, Sharon Shoham, James R.Wilcox, and Doug Woos. 2018. Modularity for Decidability of Deductive Verification with Applications to Distributed Systems. https://doi.org/10.5281/zenodo.2577103
[58]
Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, and Paulo Verissimo. 2011. Efficient byzantine fault-tolerance. IEEE Trans. Comput. 62, 1 (2011), 16–30.
[59]
Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Ben Livshits, and Arthur Gervais. 2022. On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy. https://doi.org/10.48550/ARXIV.2201.09035
[60]
Nico Weichbrodt, Anil Kurmus, Peter Pietzuch, and Rüdiger Kapitza. 2016. AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves. In Computer Security – ESORICS 2016, Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, and Catherine Meadows (Eds.). Springer, Cham, 440–457.
[61]
Ofir Weisse, Valeria Bertacco, and Todd Austin. 2017. Regaining Lost Cycles with HotCalls: A Fast Interface for SGX Secure Enclaves. In Proceedings of the 44th Annual International Symposium on Computer Architecture (Toronto, ON, Canada) (ISCA '17). ACM, New York, NY, USA, 81–93. https://doi.org/10.1145/3079856.3080208
[62]
Michael Whittaker, Ailidani Ailijiang, Aleksey Charapko, Murat Demirbas, Neil Giridharan, Joseph M. Hellerstein, Heidi Howard, Ion Stoica, and Adriana Szekeres. 2021. Scaling Replicated State Machines with Compartmentalization. Proc. VLDB Endow. 14, 11 (jul 2021), 2203–2215. 2150-8097 https://doi.org/10.14778/3476249.3476273
[63]
Zhuolun Xiang, Dahlia Malkhi, Kartik Nayak, and Ling Ren. 2021. Strengthened Fault Tolerance in Byzantine Fault Tolerant Replication. In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, DC, USA, 205–215. https://doi.org/10.1109/ICDCS51616.2021.00028
[64]
Jian Yin, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, and Mike Dahlin. 2003. Separating Agreement from Execution for Byzantine Fault Tolerant Services. SIGOPS Oper. Syst. Rev. 37, 5 (oct 2003), 253–267. 0163-5980 https://doi.org/10.1145/1165389.945470
[65]
Maofan Yin, Dahlia Malkhi, Michael K. Reiter, Guy Golan Gueta, and Ittai Abraham. 2019. HotStuff: BFT Consensus with Linearity and Responsiveness. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing (Toronto ON, Canada) (PODC '19). ACM, New York, NY, USA, 347–356. https://doi.org/10.1145/3293611.3331591

Cited By

View all
  • (2024)Sequential programming for distributed algorithm verification2024 IEEE 29th Pacific Rim International Symposium on Dependable Computing (PRDC)10.1109/PRDC63035.2024.00042(224-226)Online publication date: 13-Nov-2024
  • (2024)Ti-skol: A Modular Federated Learning Framework Supporting Security Countermeasure Composition2024 IEEE International Conference on Big Data (BigData)10.1109/BigData62323.2024.10825127(7860-7869)Online publication date: 15-Dec-2024
  • (2023)Byzantine Fault-Tolerant Consensus Algorithms: A SurveyElectronics10.3390/electronics1218380112:18(3801)Online publication date: 8-Sep-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
Middleware '22: Proceedings of the 23rd ACM/IFIP International Middleware Conference
November 2022
110 pages
ISBN:9781450393409
DOI:10.1145/3528535
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 October 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Byzantine Fault Tolerance
  2. Intel SGX
  3. Safety

Qualifiers

  • Research-article

Funding Sources

Conference

Middleware '22
Sponsor:
Middleware '22: 23rd International Middleware Conference
November 7 - 11, 2022
QC, Quebec, Canada

Acceptance Rates

Middleware '22 Paper Acceptance Rate 8 of 21 submissions, 38%;
Overall Acceptance Rate 203 of 948 submissions, 21%

Upcoming Conference

MIDDLEWARE '25
26th International Middleware Conference
December 15 - 19, 2025
Nashville , TN , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)63
  • Downloads (Last 6 weeks)2
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Sequential programming for distributed algorithm verification2024 IEEE 29th Pacific Rim International Symposium on Dependable Computing (PRDC)10.1109/PRDC63035.2024.00042(224-226)Online publication date: 13-Nov-2024
  • (2024)Ti-skol: A Modular Federated Learning Framework Supporting Security Countermeasure Composition2024 IEEE International Conference on Big Data (BigData)10.1109/BigData62323.2024.10825127(7860-7869)Online publication date: 15-Dec-2024
  • (2023)Byzantine Fault-Tolerant Consensus Algorithms: A SurveyElectronics10.3390/electronics1218380112:18(3801)Online publication date: 8-Sep-2023
  • (2023)Intel Software Guard Extensions Applications: A SurveyACM Computing Surveys10.1145/359302155:14s(1-38)Online publication date: 17-Jul-2023
  • (2023)uBFT: Microsecond-Scale BFT using Disaggregated MemoryProceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 210.1145/3575693.3575732(862-877)Online publication date: 27-Jan-2023
  • (2023)Towards Scalable Resilient Federated Learning: A Fully Decentralised Approach2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops56833.2023.10150295(621-627)Online publication date: 13-Mar-2023
  • (2023)Micro Replication2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN58367.2023.00024(123-137)Online publication date: Jun-2023
  • (2023)SoK: X-assisted BFT Consensus ProtocolsBlockchain – ICBC 202310.1007/978-3-031-44920-8_4(54-71)Online publication date: 23-Sep-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media