Don't show your hand: on the security leakages of *BFT systems
نویسنده
چکیده
After the Practical Byzantine Fault Tolerance work [2], the distributed systems literature has improved quality and performance of *BFT systems. Through this definition we address all the solutions, deriving from [2], for State Machine Replication (SMR) that are based on node active replication (usally 3f+1 replicas for f faults), and where servers are always synchronized on the set of operations executed. However, many solutions aim at improving robustness and performance, providing efficient solutions to safety and liveness guarantees [3]. These requirements are surely important, but with the growth of clients number other dynamics and issues appear. The security and resilience aspect of *BFT environment is indeed an open field where the first results have started to be presented [1]. These results address the clients-replicas interaction in the first part of the protocol (usually attacking the primary or injecting view inconsistency). One of the most important problems is the trust that clients received. *BFT systems usually return to the clients a set of answers (usually a quorum of at least f+1 ) and then clients understand if a correct quorum has been reached. Hiding conveniently what happens inside can relieve the system from DDoS or from targeting the faulty nodes. With the actual solutions the clients can indeed infer from the REPLY messages received the number and the identity of the replicas that are working accurately and the ones that are faulty or unavailable. They can exploit these valuable information to form a coalition and to easily bring an attack against the system. BODY The reply messages of the *BFT distributed systems expose the status of your servers and turn you into a target for malicious attackers.
منابع مشابه
Concurrent Zero-Knowledge - With Additional Background by Oded Goldreich
Change your habit to hang or waste the time to only chat with your friends. It is done by your everyday, don't you feel bored? Now, we will show you the new habit that, actually it's a very old habit to do that can make your life more qualified. When feeling bored of always chatting with your friends all free time, you can find the book enPDF concurrent zero knowledge with additional background...
متن کاملDetermining the appropriate level of protein in diet of Cyprinus carpio fry based on some parameters of growth, blood and serum biochemistry in biofloc system
The present study was conducted to determine the appropriate level of protein in diet of Cyprinus carpio fry based on biofloc technology. The experiment was designed based on triplicate of four bioflocs treatments (BFT) and one control treatment (CW). 450 specimens of C. carpio fry with mean weight of 17±0.08 g were stocked in 15 fiberglass tanks. Fish were fed in biofloc treatments with diets ...
متن کاملDigital Library Technologies: Complex Objects, Annotation, Ontologies, Classification, Extraction, and Security
Change your habit to hang or waste the time to only chat with your friends. It is done by your everyday, don't you feel bored? Now, we will show you the new habit that, actually it's a very old habit to do that can make your life more qualified. When feeling bored of always chatting with your friends all free time, you can find the book enPDF digital library technologies complex objects annotat...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملA Mechanism for Detecting and Identifying DoS attack in VANET
VANET (Vehicular Ad-hoc Network) which is a hy- brid network (combination of infrastructure and infra- structure-less networks) is an emergent technology with promising future as well as great challenges especially in security. By the other hand this type of network is very sensible to safety problem. This paper focuses on a new mechanism for DoS (denial of service) attacks on the physical and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- TinyToCS
دوره 2 شماره
صفحات -
تاریخ انتشار 2013