S. Bano, A. Sonnino, A. Chursin, D. Perelman, Z. Li, A. Ching and D. Malkhi 23:17
References
1
Ittai Abraham, Guy Gueta, Dahlia Malkhi, and Jean-Philippe Martin. Revisiting Fast Practical
Byzantine Fault Tolerance: Thelma, Velma, and Zelma. arXiv preprint arXiv:1801.10022,
2018.
2
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Maofan Yin. Sync HotStuff:
Simple and Practical Synchronous State Machine Replication. In IEEE Symposium on Security
and Privacy, 2020.
3
Peter Alvaro, Joshua Rosen, and Joseph M. Hellerstein. Lineage-Driven Fault Injection. In
SIGMOD International Conference on Management of Data, 2015.
4
Inc. Amazon Web Services. AWS Whitepapers.
https://aws.amazon.com/whitepapers
, 2017.
5
Christel Baier and Joost-Pieter Katoen. Principles of Model Checking (Representation and
Mind Series). The MIT Press, 2008.
6
Ethan Buchman. Tendermint: Byzantine Fault Tolerance in the Age of Blockchains.
https:
//cdn.relayto.com/media/files/LPgoWO18TCeMIggJVakt_tendermint.pdf, 2016.
7
Ethan Buchman, Jae Kwon, and Zarko Milosevic. The Latest Gossip on BFT Consensus.
arXiv preprint arXiv:1807.04938, 2018.
8
Vitalik Buterin and Virgil Griffith. Casper the Friendly Finality Gadget. arXiv preprint
arXiv:1710.09437, 2017.
9
Miguel Castro and Barbara Liskov. Practical Byzantine Fault Tolerance. In USENIX
Symposium on Operating Systems Design and Implementation, 1999.
10
Ang Chen, W Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah
Sherr, and Wenchao Zhou. Detecting Covert Timing Channels with Time-Deterministic Replay.
In USENIX Symposium on Operating Systems Design and Implementation, pages 541–554,
2014.
11
Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo. The Good,
the Bad, and the Differences: Better Network Diagnostics with Differential Provenance. In
ACM SIGCOMM Conference, 2016.
12 Cosmos. Cosmos Game of Stakes, 2018. https://github.com/cosmos/game-of-stakes.
13 Diem. DiemBFTBFT. https://github.com/diem/diem.
14
Patrice Godefroid, J. van Leeuwen, J. Hartmanis, G. Goos, and Pierre Wolper. Partial-Order
Methods for the Verification of Concurrent Systems: An Approach to the State-Explosion
Problem. Springer-Verlag, 1996.
15
Mohammad M Jalalzai, Jianyu Niu, and Chen Feng. Fast-hotstuff: A fast and resilient hotstuff
protocol. arXiv preprint arXiv:2010.11454, 2020.
16 Jepsen. Distributed Systems Safety Research. https://jepsen.io.
17
Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmund Wong. Zyzzyva:
Speculative Byzantine Fault Tolerance. In ACM SIGOPS Symposium on Operating Systems
Principles, 2007.
18
Leslie Lamport. The Temporal Logic of Actions. ACM Transactions on Programming Languages
and Systems, May 1994.
19
Leslie Lamport, R. Shostak, and M. Pease. The Byzantine Generals Problem. ACM Transac-
tions on Programming Languages and Systems, 4:382–401, 1982.
20
Hyojeong Lee, Jeff Seibert, Endadul Hoque, Charles Killian, and Cristina Nita-Rotaru. Turret:
A platform for automated attack finding in unmodified distributed system implementations. In
2014 IEEE 34th International Conference on Distributed Computing Systems, pages 660–669.
IEEE, 2014.
21
Chia-Chi Lin, Virajith Jalaparti, Matthew Caesar, and Jacobus Van der Merwe. DEFINED:
Deterministic Execution for Interactive Control-Plane Debugging. In USENIX Technical
Conference, 2013.
22
J-P Martin and Lorenzo Alvisi. Fast Byzantine Consensus. IEEE Transactions on Dependable
and Secure Computing, 3(3):202–215, 2006.
C V I T 2 0 1 6