Skip to main content

Showing 1–20 of 20 results for author: Bessani, A

.
  1. arXiv:2405.06055  [pdf, other

    cs.DC

    Knowledge Connectivity Requirements for Solving BFT Consensus with Unknown Participants and Fault Threshold (Extended Version)

    Authors: Hasan Heydari, Robin Vassantlal, Alysson Bessani

    Abstract: Consensus stands as a fundamental building block for constructing reliable and fault-tolerant distributed services. The increasing demand for high-performance and scalable blockchain protocols has brought attention to solving consensus in scenarios where each participant joins the system knowing only a subset of participants. In such scenarios, the participants' initial knowledge about the existen… ▽ More

    Submitted 2 July, 2024; v1 submitted 9 May, 2024; originally announced May 2024.

    Comments: Preprint of a paper to appear at the 44th IEEE International Conference on Distributed Computing Systems (ICDCS 2024)

  2. arXiv:2405.04606  [pdf, other

    cs.DC

    Probabilistic Byzantine Fault Tolerance (Extended Version)

    Authors: Diogo Avelãs, Hasan Heydari, Eduardo Alchieri, Tobias Distler, Alysson Bessani

    Abstract: Consensus is a fundamental building block for constructing reliable and fault-tolerant distributed services. Many Byzantine fault-tolerant consensus protocols designed for partially synchronous systems adopt a pessimistic approach when dealing with adversaries, ensuring safety in a deterministic way even under the worst-case scenarios that adversaries can create. Following this approach typically… ▽ More

    Submitted 11 June, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: Preprint of a paper to appear at the 43rd ACM Symposium on Principles of Distributed Computing (PODC 2024)

  3. arXiv:2401.15127  [pdf, other

    cs.CR cs.CL cs.LG

    Evaluation of LLM Chatbots for OSINT-based Cyber Threat Awareness

    Authors: Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira

    Abstract: Knowledge sharing about emerging threats is crucial in the rapidly advancing field of cybersecurity and forms the foundation of Cyber Threat Intelligence (CTI). In this context, Large Language Models are becoming increasingly significant in the field of cybersecurity, presenting a wide range of opportunities. This study surveys the performance of ChatGPT, GPT4all, Dolly, Stanford Alpaca, Alpaca-Lo… ▽ More

    Submitted 19 April, 2024; v1 submitted 26 January, 2024; originally announced January 2024.

  4. arXiv:2312.05714  [pdf, other

    cs.DC cs.CR

    Vivisecting the Dissection: On the Role of Trusted Components in BFT Protocols

    Authors: Alysson Bessani, Miguel Correia, Tobias Distler, Rüdiger Kapitza, Paulo Esteves-Verissimo, Jiangshan Yu

    Abstract: A recent paper by Gupta et al. (EuroSys'23) challenged the usefulness of trusted component (TC) based Byzantine fault-tolerant (BFT) protocols to lower the replica group size from $3f+1$ to $2f+1$, identifying three limitations of such protocols and proposing that TCs should be used instead to improve the performance of BFT protocols. Here, we point out flaws in both arguments and advocate that th… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

  5. arXiv:2306.03185  [pdf, other

    cs.DC

    How Hard is Asynchronous Weight Reassignment? (Extended Version)

    Authors: Hasan Heydari, Guthemberg Silvestre, Alysson Bessani

    Abstract: The performance of distributed storage systems deployed on wide-area networks can be improved using weighted (majority) quorum systems instead of their regular variants due to the heterogeneous performance of the nodes. A significant limitation of weighted majority quorum systems lies in their dependence on static weights, which are inappropriate for systems subject to the dynamic nature of networ… ▽ More

    Submitted 23 June, 2023; v1 submitted 5 June, 2023; originally announced June 2023.

    Comments: This is the extended version of a paper to appear at the 43rd IEEE International Conference on Distributed Computing Systems (ICDCS 2023)

  6. arXiv:2305.17989  [pdf, other

    cs.DC cs.CR

    On the Minimal Knowledge Required for Solving Stellar Consensus

    Authors: Robin Vassantlal, Hasan Heydari, Alysson Bessani

    Abstract: Byzantine Consensus is fundamental for building consistent and fault-tolerant distributed systems. In traditional quorum-based consensus protocols, quorums are defined using globally known assumptions shared among all participants. Motivated by decentralized applications on open networks, the Stellar blockchain relaxes these global assumptions by allowing each participant to define its quorums usi… ▽ More

    Submitted 23 June, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

    Comments: Preprint of a paper to appear at the 43rd IEEE International Conference on Distributed Computing Systems (ICDCS 2023)

  7. arXiv:2305.15000  [pdf, other

    cs.DC

    Chasing the Speed of Light: Low-Latency Planetary-Scale Adaptive Byzantine Consensus

    Authors: Christian Berger, Lívio Rodrigues, Hans P. Reiser, Vinicius Cogo, Alysson Bessani

    Abstract: Blockchain technology has sparked renewed interest in planetary-scale Byzantine fault-tolerant (BFT) state machine replication (SMR). While recent works have mainly focused on improving the scalability and throughput of these protocols, few have addressed latency. We present FlashConsensus, a novel transformation for optimizing the latency of quorum-based BFT consensus protocols. FLASHCONSENSUS us… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: 18 pages

  8. arXiv:2305.05388  [pdf, other

    cs.AR cs.AI cs.CR

    VEDLIoT -- Next generation accelerated AIoT systems and applications

    Authors: Kevin Mika, René Griessl, Nils Kucza, Florian Porrmann, Martin Kaiser, Lennart Tigges, Jens Hagemeyer, Pedro Trancoso, Muhammad Waqar Azhar, Fareed Qararyah, Stavroula Zouzoula, Jämes Ménétrey, Marcelo Pasin, Pascal Felber, Carina Marcus, Oliver Brunnegard, Olof Eriksson, Hans Salomonsson, Daniel Ödman, Andreas Ask, Antonio Casimiro, Alysson Bessani, Tiago Carvalho, Karol Gugala, Piotr Zierhoffer , et al. (7 additional authors not shown)

    Abstract: The VEDLIoT project aims to develop energy-efficient Deep Learning methodologies for distributed Artificial Intelligence of Things (AIoT) applications. During our project, we propose a holistic approach that focuses on optimizing algorithms while addressing safety and security challenges inherent to AIoT systems. The foundation of this approach lies in a modular and scalable cognitive IoT hardware… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197. CF'23: 20th ACM International Conference on Computing Frontiers, May 2023, Bologna, Italy

    Journal ref: CF'23: 20th ACM International Conference on Computing Frontiers, May 2023, Bologna, Italy

  9. arXiv:2207.00675  [pdf, other

    cs.AR cs.CR cs.DC cs.PF

    VEDLIoT: Very Efficient Deep Learning in IoT

    Authors: Martin Kaiser, Rene Griessl, Nils Kucza, Carola Haumann, Lennart Tigges, Kevin Mika, Jens Hagemeyer, Florian Porrmann, Ulrich Rückert, Micha vor dem Berge, Stefan. Krupop, Mario Porrmann, Marco Tassemeier, Pedro Trancoso, Fareed Quararyah, Stavroula Zouzoula, Antonio Casimiro, Alysson Bessani, Jose Cecilio, Stefan Andersson, Oliver Brunnegard, Olof Eriksson, Roland Weiss, Franz Meierhöfer, Hans Salomonsson , et al. (11 additional authors not shown)

    Abstract: The VEDLIoT project targets the development of energy-efficient Deep Learning for distributed AIoT applications. A holistic approach is used to optimize algorithms while also dealing with safety and security challenges. The approach is based on a modular and scalable cognitive IoT hardware platform. Using modular microserver technology enables the user to configure the hardware to satisfy a wide r… ▽ More

    Submitted 1 July, 2022; originally announced July 2022.

    Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197

    Journal ref: DATE'22: Proceedings of the 25th Conference & Exhibition on Design, Automation & Test in Europe, March 2022, pp. 963-968

  10. arXiv:2107.11144  [pdf, other

    cs.DC

    Making Reads in BFT State Machine Replication Fast, Linearizable, and Live

    Authors: Christian Berger, Hans P. Reiser, Alysson Bessani

    Abstract: Practical Byzantine Fault Tolerance (PBFT) is a seminal state machine replication protocol that achieves a performance comparable to non-replicated systems in realistic environments. A reason for such high performance is the set of optimizations introduced in the protocol. One of these optimizations is read-only requests, a particular type of client request which avoids running the three-step agre… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

    Comments: 12 pages, to appear in the 40th IEEE Symposium on Reliable Distributed Systems (SRDS)

  11. AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus

    Authors: Christian Berger, Hans P. Reiser, João Sousa, Alysson Bessani

    Abstract: With upcoming blockchain infrastructures, world-spanning Byzantine consensus is getting practical and necessary. In geographically distributed systems, the pace at which consensus is achieved is limited by the heterogenous latencies of connections between replicas. If deployed on a wide-area network, consensus-based systems benefit from weighted replication, an approach that utilizes extra replica… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

    Comments: This paper consists of 16 pages in total. This paper is the accepted version to be published in IEEE Transactions on Dependable and Secure Computing (2020). For the published version refer to DOI https://doi.org/10.1109/TDSC.2020.3030605

  12. arXiv:2004.14527  [pdf, other

    cs.DC cs.CR

    From Byzantine Replication to Blockchain: Consensus is only the Beginning

    Authors: Alysson Bessani, Eduardo Alchieri, João Sousa, André Oliveira, Fernando Pedone

    Abstract: The popularization of blockchains leads to a resurgence of interest in Byzantine Fault-Tolerant (BFT) state machine replication protocols. However, much of the work on this topic focuses on the underlying consensus protocols, with emphasis on their lack of scalability, leaving other subtle limitations unaddressed. These limitations are related to the effects of maintaining a durable blockchain ins… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: This is a preprint of a paper to appear on the 50th IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN'20)

  13. arXiv:2004.05933  [pdf, other

    cs.DC

    Smart Contracts on the Move

    Authors: Enrique Fynn, Alysson Bessani, Fernando Pedone

    Abstract: Blockchain systems have received much attention and promise to revolutionize many services. Yet, despite their popularity, current blockchain systems exist in isolation, that is, they cannot share information. While interoperability is crucial for blockchain to reach widespread adoption, it is difficult to achieve due to differences among existing blockchain technologies. This paper presents a tec… ▽ More

    Submitted 23 April, 2020; v1 submitted 13 April, 2020; originally announced April 2020.

    Comments: Preprint to appear in the 50th IEEE/IFIP Dependable Systems and Networks Conference (DSN'20)

  14. arXiv:1905.08637  [pdf, other

    cs.DC

    Auditable Register Emulations

    Authors: Vinicius V. Cogo, Alysson Bessani

    Abstract: The widespread prevalence of data breaches amplifies the importance of auditing storage systems. In this work, we initiate the study of auditable storage emulations, which provide the capability for an auditor to report the previously executed reads in a register. We precisely define the notion of auditable register and its properties, and establish tight bounds and impossibility results for audit… ▽ More

    Submitted 16 May, 2020; v1 submitted 21 May, 2019; originally announced May 2019.

    Comments: 16 pages, 2 figures, 1 algorithm. Improved the model definition, simplified the configuration figures, and added a section about signed reads

  15. arXiv:1904.02072  [pdf, other

    cs.CR cs.LG

    Processing Tweets for Cybersecurity Threat Awareness

    Authors: Fernando Alves, Aurélien Bettini, Pedro M. Ferreira, Alysson Bessani

    Abstract: Receiving timely and relevant security information is crucial for maintaining a high-security level on an IT infrastructure. This information can be extracted from Open Source Intelligence published daily by users, security organisations, and researchers. In particular, Twitter has become an information hub for obtaining cutting-edge information about many subjects, including cybersecurity. This w… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

  16. arXiv:1904.01127  [pdf, other

    cs.LG cs.CR cs.SI stat.ML

    Cyberthreat Detection from Twitter using Deep Neural Networks

    Authors: Nuno Dionísio, Fernando Alves, Pedro M. Ferreira, Alysson Bessani

    Abstract: To be prepared against cyberattacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds. Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

  17. arXiv:1804.09107  [pdf, other

    cs.DC

    SITAN: Services for Fault-Tolerant Ad Hoc Networks with Unknown Participants

    Authors: David R. Matos, Nuno Neves, Alysson Bessani

    Abstract: The evolution of mobile devices with various capabilities (e.g., smartphones and tablets), together with their ability to collaborate in impromptu ad hoc networks, opens new opportunities for the design of innovative distributed applications. The development of these applications needs to address several difficulties, such as the unreliability of the network, the imprecise set of participants, or… ▽ More

    Submitted 25 April, 2018; v1 submitted 24 April, 2018; originally announced April 2018.

  18. arXiv:1709.06921  [pdf, other

    cs.CR cs.DC

    A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform

    Authors: João Sousa, Alysson Bessani, Marko Vukolić

    Abstract: Hyperledger Fabric (HLF) is a flexible permissioned blockchain platform designed for business applications beyond the basic digital coin addressed by Bitcoin and other existing networks. A key property of HLF is its extensibility, and in particular the support for multiple ordering services for building the blockchain. Nonetheless, the version 1.0 was launched in early 2017 without an implementati… ▽ More

    Submitted 20 September, 2017; originally announced September 2017.

  19. arXiv:1607.05344  [pdf, other

    cs.DC

    Efficient and Modular Consensus-Free Reconfiguration for Fault-Tolerant Storage

    Authors: Eduardo Alchieri, Alysson Bessani, Fabiola Greve, Joni Fraga

    Abstract: Quorum systems are useful tools for implementing consistent and available storage in the presence of failures. These systems usually comprise a static set of servers that provide a fault-tolerant read/write register accessed by a set of clients. We consider a dynamic variant of these systems and propose FreeStore, a set of fault-tolerant protocols that emulates a register in dynamic asynchronous s… ▽ More

    Submitted 18 July, 2016; originally announced July 2016.

  20. arXiv:1407.6062  [pdf, other

    cs.NI

    SMaRtLight: A Practical Fault-Tolerant SDN Controller

    Authors: Fábio Botelho, Alysson Bessani, Fernando M. V. Ramos, Paulo Ferreira

    Abstract: The increase in the number of SDN-based deployments in production networks is triggering the need to consider fault-tolerant designs of controller architectures. Commercial SDN controller solutions incorporate fault tolerance, but there has been little discussion in the SDN literature on the design of such systems and the tradeoffs involved. To fill this gap, we present a by-construction design of… ▽ More

    Submitted 22 July, 2014; originally announced July 2014.