Byung-gon Chun

نویسندگان

  • BYUNG-GON CHUN
  • Sylvia Ratnasamy
چکیده

International Computer Science Institute, Berkeley, CA 2007 – Present Postdoctoral Researcher, Networking Group, working with Prof. Scott Shenker, Dr. Petros Maniatis, and Dr. Sylvia Ratnasamy Diverse replication for single-machine Byzantine-fault tolerance: Investigate exploiting cores in many-core systems to defend against software attacks. Explore different isolation and software diversity mechanisms for single-machine Byzantine-fault tolerance. Explore the design space of Byzantine-fault tolerance protocols enabled by this new single-machine execution environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mechanisms to Tolerate Misbehavior in Replicated Systems

Mechanisms to Tolerate Misbehavior in Replicated Systems

متن کامل

Review of Packet Scheduling Algorithms in Mobile Ad Hoc Networks

Scheduling algorithms are important components in the provision of guaranteed quality of service parameters. The design of scheduling algorithms for mobile ad hoc networks is

متن کامل

Diverse Replication for Single-Machine Byzantine-Fault Tolerance

New single-machine environments are emerging from abundant computation available through multiple cores and secure virtualization. In this paper, we describe the research challenges and opportunities around diversified replication as a method to increase the Byzantine-fault tolerance (BFT) of single-machine servers to software attacks or errors. We then discuss the design space of BFT protocols...

متن کامل

Making Programs Forget: Enforcing Lifetime for Sensitive Data

This paper introduces guaranteed data lifetime, a novel system property ensuring that sensitive data cannot be retrieved from a system beyond a specified time. The trivial way to achieve this is to “reboot”; however, this is disruptive from the user’s perspective, and may not even eliminate disk copies. We discuss an alternate approach based on state re-incarnation where data expiry is complete...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008