YoVDO

The Honey Badger of BFT Protocols

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses

Course Description

Overview

Explore a groundbreaking presentation on the Honey Badger Byzantine Fault Tolerance (BFT) protocol delivered at the 23rd ACM Conference on Computer and Communications Security. Delve into the innovative asynchronous protocol designed to overcome timing assumptions in distributed systems. Learn about the protocol's optimal resilience, implementation strategies, and potential deployment scenarios in wide area networks. Gain insights from the collaborative work of researchers from the University of Maryland, Tsinghua University, Cornell University, and the University of California as they discuss the separation of concerns in BFT protocols, reliable broadcast mechanisms, and parameter tuning techniques. Conclude with a Q&A session addressing audience inquiries about this robust and adaptable BFT solution.

Syllabus

Introduction
Honey Badger
Asynchronous Protocols
The Honey Badger
Timing Assumptions
Parameter Tuning
Separation
Explanation
Reliable Broadcast
Optimal Resilience
Implementations
Wide Area Network
Deployment Scenarios
Questions


Taught by

ACM CCS

Related Courses

Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor Browser
Association for Computing Machinery (ACM) via YouTube
DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube
SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube
Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube
PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube