Skip to main content

Showing 1–4 of 4 results for author: Ashton, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.17455  [pdf, other

    cs.DC cs.FL cs.SE

    Smart Casual Verification of CCF's Distributed Consensus and Consistency Protocols

    Authors: Heidi Howard, Markus A. Kuppe, Edward Ashton, Amaury Chamayou, Natacha Crooks

    Abstract: The Confidential Consortium Framework (CCF) is an open-source platform for develo** trustworthy and reliable cloud applications. CCF powers Microsoft's Azure Confidential Ledger service and as such it is vital to build confidence in the correctness of CCF's design and implementation. This paper reports our experiences applying smart casual verification to validate the correctness of CCF's novel… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2404.18048  [pdf, ps, other

    cs.DC cs.LO

    Scalable, Interpretable Distributed Protocol Verification by Inductive Proof Slicing

    Authors: William Schultz, Edward Ashton, Heidi Howard, Stavros Tripakis

    Abstract: Many techniques for automated inference of inductive invariants for distributed protocols have been developed over the past several years, but their performance can still be unpredictable and their failure modes opaque for large-scale verification tasks. In this paper, we present inductive proof slicing, a new automated, compositional technique for inductive invariant inference that scales effecti… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

  3. arXiv:2310.11559  [pdf, other

    cs.CR cs.DC

    Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability

    Authors: Heidi Howard, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud, Cedric Fournet, Andrew Jeffery, Matthew Kerner, Fotios Kounelis, Markus A. Kuppe, Julien Maffre, Mark Russinovich, Christoph M. Wintersteiger

    Abstract: Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential properties for trustworthy data systems. The rise of cloud computing and the growing demand for multiparty applications however means that building modern CIA systems is more challenging than ever. In response, we present the Confidential Consortium Framework (CCF), a general-purpose foundation for deve… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: 16 pages, 9 figures. To appear in the Proceedings of the VLDB Endowment, Volume 17

  4. arXiv:2105.13116  [pdf, other

    cs.DC

    IA-CCF: Individual Accountability for Permissioned Ledgers

    Authors: Alex Shamis, Peter Pietzuch, Miguel Castro, Cédric Fournet, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Matthew Kerner, Julien Maffre, Manuel Costa, Mark Russinovich

    Abstract: Permissioned ledger systems allow a consortium of members that do not trust one another to execute transactions safely on a set of replicas. Such systems typically use Byzantine fault tolerance (BFT) protocols to distribute trust, which only ensures safety when fewer than 1/3 of the replicas misbehave. Providing guarantees beyond this threshold is a challenge: current systems assume that the ledge… ▽ More

    Submitted 8 March, 2022; v1 submitted 27 May, 2021; originally announced May 2021.