The Honey Badger of BFT Protocols
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a groundbreaking presentation on the Honey Badger Byzantine Fault Tolerance (BFT) protocol delivered at the 23rd ACM Conference on Computer and Communications Security. Delve into the innovative asynchronous protocol designed to overcome timing assumptions in distributed systems. Learn about the protocol's optimal resilience, implementation strategies, and potential deployment scenarios in wide area networks. Gain insights from the collaborative work of researchers from the University of Maryland, Tsinghua University, Cornell University, and the University of California as they discuss the separation of concerns in BFT protocols, reliable broadcast mechanisms, and parameter tuning techniques. Conclude with a Q&A session addressing audience inquiries about this robust and adaptable BFT solution.
Syllabus
Introduction
Honey Badger
Asynchronous Protocols
The Honey Badger
Timing Assumptions
Parameter Tuning
Separation
Explanation
Reliable Broadcast
Optimal Resilience
Implementations
Wide Area Network
Deployment Scenarios
Questions
Taught by
ACM CCS
Related Courses
Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor BrowserAssociation for Computing Machinery (ACM) via YouTube DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube