Making Adversaries Stick to their Word Presented by Chuan He 1 - - PowerPoint PPT Presentation

making adversaries stick to
SMART_READER_LITE
LIVE PREVIEW

Making Adversaries Stick to their Word Presented by Chuan He 1 - - PowerPoint PPT Presentation

Attested Append-Only Memory: Making Adversaries Stick to their Word Presented by Chuan He 1 Talk Outline Introduction and Motivation Attested Append-Only Memory (A2M) A2M Protocols Evaluation Conclusion 2 Motivation


slide-1
SLIDE 1

1

Attested Append-Only Memory: Making Adversaries Stick to their Word

Presented by Chuan He

slide-2
SLIDE 2

2

Talk Outline

  • Introduction and Motivation
  • Attested Append-Only Memory (A2M)
  • A2M Protocols
  • Evaluation
  • Conclusion
slide-3
SLIDE 3

3

Motivation

 You want to build a service

– Easy on a single machine – Replicate service on multiple machines

  • Replicated services must appear as single

server

– Linearizability: Completed client requests appear to have been processed in a single, totally ordered, serial schedule consistent with the order they were submitted

slide-4
SLIDE 4

4

Motivation

 You want to build a service

– Easy on a single machine – Replicate service on multiple machines

  • Replicated services must appear as single

server

– Equivocation: Different lies to different people

slide-5
SLIDE 5

Servers Equivocating to Clients

slide-6
SLIDE 6

Servers Equivocating to Servers

slide-7
SLIDE 7

7

Questions

  • Does preventing equivocation help at all?

– Can we improve upon the 1/3 Byzantine fault bound?

  • How do we prevent equivocation?

– Is there any minimal system support?

slide-8
SLIDE 8

8

Talk Outline

  • Introduction and Motivation
  • Attested Append-Only Memory (A2M)
  • A2M Protocols
  • Evaluation
  • Conclusion
slide-9
SLIDE 9

9

Attested Append-Only Memory (A2M)

  • A set of numbered logs
  • Each log entry contains

– Sequence number – Stored value – Crypto digest

  • lookup / end

– Get a log entry – Attest (sequence number, value, history digest) – Attest freshness – Attest the end of log

  • append / advance

– Cannot overwrite

slide-10
SLIDE 10

10

Attested Append-Only Memory (A2M)

  • append / advance
  • Important feature

– Cannot equivocate

slide-11
SLIDE 11

11

Background: PBFT

time

Primary Client1

Preprepare Prepare Commit Request Reply Execute

    s1 s2 s3 s4 Quorum = 3

[1,a]

Client2

[1,b] Quorum: matching messages from different replicas

req,resp

Agreement Execution

slide-12
SLIDE 12

12

A2M-PBFT-E(Execution)

time

Primary Client1

Preprepare Prepare Commit Request Reply Execute

    s1 s2 s3 s4 Quorum = 3

Attested by A2M

req,resp, <seq,req,hist> Request log A2M

slide-13
SLIDE 13

13

A2M-PBFT-EA (2f + 1 replicas)

time

Primary Client1

Preprepare Prepare Commit Request Reply Execute

   s1 s2 s3 Quorum = 2

Attested by A2M

req,resp, <seq,req,hist>

slide-14
SLIDE 14

14

Protocol Trade-offs

3f+1 2/3 1/3

A2M-PBFT-E

1/2

A2M-PBFT-EA PBFT

1/3

slide-15
SLIDE 15

15

Evaluation Setup

  • Implemented A2M-PBFT-E and A2M-PBFT-EA
  • A2M protocols use signatures or MACs for

authentication

  • Four replicas in a LAN. Each replica has its own A2M.
  • Microbenchmarks

– Null operation with various request or response sizes

  • Macrobenchmarks: NFS

– Software package compilation

slide-16
SLIDE 16

Evaluation - Microbenchmarks

slide-17
SLIDE 17

Evaluation - Macrobenchmarks

slide-18
SLIDE 18

Varying delay time

slide-19
SLIDE 19

19

Conclusions

  • Present A2M, a small trusted, log-based memory

– Simple and easily implementable – Prevent equivocation

  • Improve fault tolerance by forcing servers to commit

to a single history of operations

– Improve fault bounds of BFT state machine replication – Achieve linearizability in an untrusted single-server system – The benefits are achieved with small performance

  • verhead
slide-20
SLIDE 20

20

Thank you!

slide-21
SLIDE 21

21

Related Work

  • Weaken the guarantee

– fork* consistency [NSDI07] – fork consistency [OSDI04]

  • Standard trusted hardware like TPM

– does not improve the fault bound

  • Auditing

– PeerReview [SOSP07], CATS [FAST07]

  • Shared file servers

– SUNDR[OSDI04], Ivy [OSDI02], Plutus[FAST03]

  • Separating agreement from execution
  • Symmetric faults – hybrid fault model
  • Group communication