전체 글
![[논문 세미나] Bullshark: DAG BFT Protocols Made Practical](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fv4mZF%2FbtsmyZS9mqF%2Fu8e05mspBWH0HOxHGzeqo1%2Fimg.png)
[논문 세미나] Bullshark: DAG BFT Protocols Made Practical
Authors: Alexander Spiegelman, Neil Giridharan, Alberto Sonnino, Lefteris Kokoris-Kogias Journal/Conference: ACM CCS '22 Source: https://arxiv.org/abs/2201.05677 Presentation material: Abstract We present Bullshark, the first directed acyclic graph (DAG) based asynchronous Byzantine Atomic Broadcast protocol that is optimized for the common synchronous case. Like previous DAG-based BFT protocols..
![[논문 리뷰] DORA: Distributed Oracle Agreement with Simple Majority](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2Fs2Zad%2FbtslcCjDYen%2FmTeYSyZgzlBQQnxBhwROW1%2Fimg.png)
[논문 리뷰] DORA: Distributed Oracle Agreement with Simple Majority
Authors: Prasanth Chakka, Saurabh Joshi, Aniket Kate, Joshua Tobkin, David Yang Journal/Conference: ICDCS '23 Source: https://arxiv.org/abs/2305.03903 Abstract Oracle networks feeding off-chain information to a blockchain are required to solve a distributed agreement problem since these networks receive information from multiple sources and at different times. We make a key observation that in m..
![[논문 리뷰] When Private Blockchain Meets Deterministic Database](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FbxSnJX%2FbtskQPdzlWp%2FykXCYQLRS16ulPuFWrfXP1%2Fimg.png)
[논문 리뷰] When Private Blockchain Meets Deterministic Database
Authors: Ziliang Lai, Chris Liu, Eric Lo Journal/Conference: ACM PODS ‘23 Source: https://dl.acm.org/doi/10.1145/3588952 presentation materials: Abstract Private blockchain as a replicated transactional system shares many commonalities with distributed database. However, the intimacy between private blockchain and deterministic database has never been studied. In essence, private blockchain and ..
![[KCC 2023] Survey on Asynchronous BFT consensus Algorithms for Scalable and Robust Blockchain](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcolDuv%2FbtskSoFZlY1%2FrTUa4jjCewSOk7KnM2Uad0%2Fimg.png)
[KCC 2023] Survey on Asynchronous BFT consensus Algorithms for Scalable and Robust Blockchain
Author: Donghyeon Ryu, Chanik Park in POSTECH Journal/Conference: KCC '23 Paper: (eng) (kor) Abstract Blockchain technology is being applied to various areas such as non-fungible tokens (NFTs), decentralized finance (DeFi), security tokens (STs), central bank digital currencies (CBDCs), and decentralized identity (DID) based on its decentralization, transparency, and high reliability. However, t..
Paper references about Hyperledger fabric
[StreamChain] StreamChain: Do Blockchains Need Blocks? (ACM SERIAL'18) : https://doi.org/10.1145/3284764.3284765 [FastFabric] FastFabric: Scaling Hyperledger Fabric to 20,000 Transactions per Second (IEEE ICBC '19) : https://arxiv.org/abs/1901.00910 [Fabric++] Blurring the Lines between Blockchains and Database Systems: the Case of Hyperledger Fabric. (ACM PODS ’19) : https://bigdata.uni-saarlan..
![[논문 리뷰] Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FceVWRn%2FbtshbsyWHJX%2Fc1WnvPWxNdqRzMUb7hOWNK%2Fimg.png)
[논문 리뷰] Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique
Authors: Yoochan Lee and Jinhan Kwak, Seoul National University; Junesoo Kang and Yuseok Jeon, UNIST; Byoungyoung Lee, Seoul National University Journal/Conference: USENIX security '23 (open access) Source: https://www.usenix.org/conference/usenixsecurity23/presentation/lee Abstract The stealthiness of an attack is the most vital consideration for an attacker to reach their goals without being d..
![[논문 리뷰] Privbox: Faster System Calls Through Sandboxed Privileged Execution](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FoOTcF%2FbtshaUbpig9%2FmU2mHaOl1frYDkZFBLg0Y0%2Fimg.png)
[논문 리뷰] Privbox: Faster System Calls Through Sandboxed Privileged Execution
Authors: Dmitry Kuznetsov and Adam Morrison, Tel Aviv University Journal/Conference: USENIX ATC 22' Source: https://www.usenix.org/conference/atc22/presentation/kuznetsov Presentation material: Abstract System calls are the main method for applications to request services from the operating system, but their invocation incurs considerable overhead, which has been aggravated by mitigation mechani..
![[논문 리뷰] IPLFS: Log-Structured File System without Garbage Collection](https://img1.daumcdn.net/thumb/R750x0/?scode=mtistory2&fname=https%3A%2F%2Fblog.kakaocdn.net%2Fdn%2FcCEzAx%2FbtsgGlNTa7g%2FJ2IUz0utbW8MGeozbIO5Ik%2Fimg.png)
[논문 리뷰] IPLFS: Log-Structured File System without Garbage Collection
Authors: Juwon Kim, Minsu Jang, Muhammad Danish Tehseen, Joontaek Oh, and YouJip Won, KAIST Journal/Conference: USENIX ATC '22 Source: https://www.usenix.org/conference/atc22/presentation/kim-juwon Abstract In this work, we develop the log-structured filesystem that is free from garbage collection. There are two key technical ingredients: \emph{IPLFS}, a log-structured filesystem for infinite pa..