Academic literature on the topic 'Tolérance aux fautes byzantines'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Tolérance aux fautes byzantines.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Tolérance aux fautes byzantines"
Taïani, François, Marc-Olivier Killijian, and Jean-Charles Fabre. "Intergiciels pour la tolérance aux fautes." Techniques et sciences informatiques 25, no. 5 (June 1, 2006): 599–630. http://dx.doi.org/10.3166/tsi.25.599-630.
Full textDuong, Phuong-Quynh. "Tolérance aux fautes adaptable pour les systèmes à composants." Techniques et sciences informatiques 23, no. 2 (February 1, 2004): 205–30. http://dx.doi.org/10.3166/tsi.23.205-230.
Full textRodríguez, Manuel, Jean-Charles Fabre, and Jean Arlat. "Empaquetâches de tolérance aux fautes pour les systèmes temps réel." Techniques et sciences informatiques 23, no. 4 (April 30, 2004): 479–514. http://dx.doi.org/10.3166/tsi.23.479-514.
Full textLAPRIE, Jean-Claude. "Sûreté de fonctionnement des systèmes informatiques et tolérance aux fautes." Automatique et ingénierie système, October 1989. http://dx.doi.org/10.51257/a-v1-r7595.
Full textLAPRIE, Jean-Claude. "Sûreté de fonctionnement des systèmes informatiques et tolérance aux fautes." Traçabilité, September 1989. http://dx.doi.org/10.51257/a-v1-h4450.
Full textDissertations / Theses on the topic "Tolérance aux fautes byzantines"
Perronne, Lucas. "Vers des protocoles de tolérance aux fautes byzantines efficaces et robustes." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM075/document.
Full textOver the last decade, Cloud computing instigated an important switch of paradigm in numerous information systems. This new paradigm is mainly illustrated by the re-location of the whole IT infrastructures out of companies’ warehouses. The use of local servers has thus being replaced by remote ones, rented from dedicated providers such as Google, Amazon, Microsoft.In order to ensure the sustainability of this economic model, it appears necessary to provide several guarantees to users, related to the security, availability, or even reliability of the proposed resources. Such quality of service (QoS) factors allow providers and users to reach an agreement on the expected level of dependability. Practically, the proposed servers must episodically cope with arbitrary faults (also called byzantine faults), such as incorrect/corrupted messages, servers crashes, or even network failures. Nevertheless, the Cloud computing environment encouraged the emergence of technologies such as virtualization or state machine replication. These technologies allow cloud providers to efficiently face the occurrences of faults through the implementation of fault tolerance protocols.Byzantine Fault Tolerance (BFT) is a research area involving state machine replication concepts, and aiming at ensuring continuity and reliability of hosted services in presence of any kind of arbitrary behaviors. In order to handle such threat, numerous protocols were proposed. These protocols must be efficient in order to counterbalance the extra cost of replication, and robust in order to lower the impact of byzantine behaviors on the system performance. We first noticed that tackling both these concerns at the same time is difficult: current protocols are either designed to be efficient at the expense of their robustness, or robust at the expense of their efficiency. We tackle this specific problem in this thesis, our goal being to provide the required tools to design both efficient and robust BFT protocols.Our focus is mainly dedicated to two types of denial-of-service attacks involving requests management. The first one is caused by the partial corruption of a request transmitted by a client. The second one is caused by the intentional drop of a request upon receipt. In order to face efficiently both these byzantine behaviors, several mechanisms were integrated in robust BFT protocols. In practice, these mecanisms involve high overheads, and thus lead to the significant performance drop of robust protocols compared to efficien ones. This assessment allows us to introduce our first contribution: the definition of several generic design principles, applicable to numerous existing BFT protocols, and aiming at reducing these overheads while maintaining the same level of robustness.The second contribution introduces ER-PBFT, a new protocol implementing these design principles on PBFT, the reference in terms of byzantine fault tolerance. We demonstrate the efficiency of our new robustness policy, both in fault-free scenarios and in presence of byzantine behaviors.The third contribution highlights ER-COP, a new BFT protocol dedicated to both efficiency and robustness, implementing our design principles on COP, the BFT protocol providing for now the best performances in a fault-free environment. We evaluate the additional cost introduced by our robustness policy, and we demonstrate ER-COP's ability to handle byzantine behaviors
Aublin, Pierre-Louis. "Vers des protocoles de tolérance aux fautes Byzantines efficaces et robustes." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM006/document.
Full textInformation systems become more and more complex and it is difficult to guarantee that they are bug-free. State Machine Replication is a technique for tolerating faults, regardless their nature, whether they are software or hardware faults. This thesis studies Fault Tolerant State Machine Replication protocols that tolerate arbitrary, also called Byzantine, faults. These protocols face two challenges: (i) they must be efficient, i.e., their performance have to be the best ones, in order to mask the cost of the replication and (ii) they must be robust, i.e., an attack should not cause an important performance degradation. In this thesis, we observe that no protocol addresses both of these challenges: current protocols are either designed to be efficient but fail to be robust, or designed to be robust but exhibit poor performance. A first contribution of this thesis is the design of a new protocol which achieves the best of both worlds. This protocol, R-Aliph, combines an efficient but not robust protocol with a protocol designed to be robust. The result is a protocol that is both robust and efficient. We evaluate this protocol experimentally and show that its performance under attack equals the performance of the underlying robust protocol. Moreover, its performance in the fault-free case is close to the performance of the best known efficient protocol: the maximal throughput difference is less than 6%. In the second part of this thesis we analyze the state-of-the-art robust protocols and demonstrate that they are not effectively robust. Indeed, one can run an attack on each of these protocols such that the throughput loss is at least equal to 78%. We identify the problem of these protocols and design a new, effectively robust, protocol called RBFT. The main idea of this protocol is to execute several instances of a robust protocol in parallel and closely monitor their performance, in order to detect a malicious behaviour. We evaluate RBFT in the fault-free case and under attack. We observe that its performance in the fault-free case is equivalent to the performance of the other so-called robust BFT protocols. Moreover, we show that the maximal throughput degradation, under the worst possible attack, is less than 3%
Maurer, Alexandre. "Communication fiable dans les réseaux multi-sauts en présence de fautes byzantines." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066347/document.
Full textAs modern networks grow larger and larger, they become more likely to fail. Indeed, their nodes can be subject to attacks, failures, memory corruptions... In order to encompass all possible types of failures, we consider the most general model of failure: the Byzantine model, where the failing nodes have an arbitrary (and thus, potentially malicious) behavior. Such failures are extremely dangerous, as one single Byzantine node, if not neutralized, can potentially lie to the entire network. We consider the problem of reliably exchanging information in a multihop network despite such Byzantine failures. Solutions exist but require a dense network, where each node has a large number of neighbors. In this thesis, we propose solutions for sparse networks, such as the grid, where each node has at most 4 neighbors. In a first part, we accept that some correct nodes fail to communicate reliably. In exchange, we propose quantitative solutions that tolerate a large number of Byzantine failures, and significantly outperform previous solutions in sparse networks. In a second part, we propose algorithms that ensure reliable communication between all correct nodes, provided that the Byzantine nodes are sufficiently distant from each other. At last, we generalize existing results to new contexts: dynamic networks, and networks with an unbounded diameter
Maurer, Alexandre. "Communication fiable dans les réseaux multi-sauts en présence de fautes byzantines." Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066347.
Full textAs modern networks grow larger and larger, they become more likely to fail. Indeed, their nodes can be subject to attacks, failures, memory corruptions... In order to encompass all possible types of failures, we consider the most general model of failure: the Byzantine model, where the failing nodes have an arbitrary (and thus, potentially malicious) behavior. Such failures are extremely dangerous, as one single Byzantine node, if not neutralized, can potentially lie to the entire network. We consider the problem of reliably exchanging information in a multihop network despite such Byzantine failures. Solutions exist but require a dense network, where each node has a large number of neighbors. In this thesis, we propose solutions for sparse networks, such as the grid, where each node has at most 4 neighbors. In a first part, we accept that some correct nodes fail to communicate reliably. In exchange, we propose quantitative solutions that tolerate a large number of Byzantine failures, and significantly outperform previous solutions in sparse networks. In a second part, we propose algorithms that ensure reliable communication between all correct nodes, provided that the Byzantine nodes are sufficiently distant from each other. At last, we generalize existing results to new contexts: dynamic networks, and networks with an unbounded diameter
Quéma, Vivien. "Contributions to Building Efficient and Robust State-Machine Replication Protocols." Habilitation à diriger des recherches, Université de Grenoble, 2010. http://tel.archives-ouvertes.fr/tel-00540897.
Full textSouza, Luciano Freitas de. "Achieving accountability, reconfiguration, randomness, and secret leadership in byzantine fault tolerant distributed systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT043.
Full textThis thesis explores three fundamental problems in distributed computing. The first contribution focuses on accountable and reconfigurable distributed systems that detect and respond to component failures. A framework for implementing accountable and reconfigurable replicated services, leveraging the lattice agreement abstraction is presented. The asynchronous implementation ensures any consistency violation is followed by undeniable evidence of misbehavior, enabling seamless system reconfiguration. The second contribution addresses leader election in partially synchronous environments. Homomorphic Sortition, the first SSLE protocol for partially synchronous blockchains is introduced. Using Threshold Fully Homomorphic Encryption (ThFHE), this protocol supports diverse stake distributions and efficient off-chain execution, addressing network instability issues. Additionally, a Secret Leader Permutation (SLP) abstraction to ensure non-repeating leaders in certain blockchains, improving performance and consensus termination is proposed. Finally, the thesis explores randomness generation in distributed systems, focusing on the common coin primitive. Recognizing its impossibility in asynchronous, fault-prone environments, two relaxed versions are introduced: the approximate common coin and the Monte Carlo common coin. These abstractions provide efficient, scalable solutions tolerating up to one-third Byzantine processes without requiring trusted setup or public key infrastructure. Applying our Monte Carlo common coin protocol in binary Byzantine agreement achieves improved communication complexity, setting a new standard. All these contributions advance the robustness, efficiency, and reliability of distributed systems, providing new methods to handle accountability, leader election, and randomness generation in the lack of synchrony
Albouy, Timothé. "Foundations of reliable cooperation under asynchrony, Byzantine faults, and message adversaries." Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS062.
Full textThis thesis explores fault-tolerant distributed systems. It focuses more specifically on implementing reliable broadcast in asynchronous environments prone to hybrid failures. We introduce a novel computing model combining Byzantine process failures with a message adversary. We then define the Message-Adversary-tolerant Byzantine Reliable Broadcast (MBRB) abstraction and prove its optimal resilience condition. We present three key algorithms implementing this abstraction: a simple signature-based MBRB algorithm, a new primitive called k2l-cast for cryptography-free MBRB implementations, and an erasure-coding-based MBRB algorithm optimizing communication complexity. These contributions advance the understanding of fault-tolerant distributed systems and provide a foundation for designing resilient and efficient distributed algorithms, with applications in critical infrastructures, financial systems, and blockchain technologies
Tonkikh, Andrei. "Distributed computing for blockchains and beyond." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT041.
Full textIn this dissertation, we address three major challenges in the design of blockchain systems in particular and large-scale fault-tolerant distributed systems in general. This work aims at improving the performance of such systems directly, as well as providing useful tools for future development of distributed algorithms.First, we explore the limits of what can be done with minimal synchronization by designing CryptoConcurrency—an asset transfer system that, instead of totally ordering all users' requests, processes concurrent requests in parallel as much as possible. Unlike other similar systems, in CryptoConcurrency, we allow the users to have shared accounts and do not make the unrealistic assumption that an honest user's account is never accessed from two devices concurrently. CryptoConcurrency explores novel theoretical grounds by addressing transaction conflicts in a dynamic, non-pairwise manner, allowing the owners of each account to independently choose their preferred mechanism for conflict resolution. Then, we improve the performance of consensus—the synchronization problem at the heart of most practical distributed systems. We build the first consensus protocol that manages to combine two desirable properties: extremely fast termination in favorable conditions and graceful recovery when such conditions are not met. The design involves a novel type of cryptographic proofs, with an efficient practical implementation.Finally, we set out to tackle the problem of designing efficient distributed protocols with weighted participation. To this end, we define several new optimization problems, related to reducing or, in other words, quantizing the weights of the participants in a way that preserves important structural properties. We show how to apply them to make weighted-model variants of a large class of distributed protocols with very little overhead compared to their counterparts in the simpler non-weighted model. For these optimization problems, we prove upper bounds, provide a practical open-source approximate solver that satisfies these upper bounds, and perform an empirical study on the weight distributions from real-world blockchain systems
Farina, Giovanni. "Tractable Reliable Communication in Compromised Networks." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS310.
Full textReliable communication is a fundamental primitive in distributed systems prone to Byzantine (i.e. arbitrary, and possibly malicious) failures to guarantee the integrity, delivery, and authorship of the messages exchanged between processes. Its practical adoption strongly depends on the system assumptions. Several solutions have been proposed so far in the literature implementing such a primitive, but some lack in scalability and/or demand topological network conditions computationally hard to be verified. This thesis aims to investigate and address some of the open problems and challenges implementing such a communication primitive. Specifically, we analyze how a reliable communication primitive can be implemented in 1) a static distributed system where a subset of processes is compromised, 2) a dynamic distributed system where part of the processes is Byzantine faulty, and 3) a static distributed system where every process can be compromised and recover. We define several more efficient protocols and we characterize alternative network conditions guaranteeing their correctness
Diarra, Amadou. "Vers une prise en charge des comportements rationnels dans les systèmes distribués." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM074/document.
Full textAccountability is becoming increasingly required in today's distributed systems. It allows not only to detect faults but also to build provable evidence about the misbehaving nodes in a distributed system. Rational nodes that aim at maximising their benefit without contributing their fair share to the system, are an example. In the literature, there exists two types of solutions that exploit accountability: specific solutions and generic solutions.Specific solutions are related to a given type of distributed system and are built by taking into account the structure of the system and the running application. As for generic solutions, they are independent to the system.In this thesis we consider the second type of solutions i.e., generic solutions. There exists two approaches in this class of solutions: hardware approach and software approach. Nowadays the only software and generic protocol that allows to enforce accountability in a distributed system is PeerReview protocol. This protocol is not based on any hardware configuration. However, it is not robust to rational behaviour in its own steps.Our objective is to provide a generic software solution to enforce accountability on any underlying application that running on a distributed system in presence of rational nodes.To reach this goal we propose FullReview a protocol that uses game theory to motivate and force rational participants to follow different steps, not only in its own protocol but also in the application that it monitors. Moreover FullReview uses the classical architecture of an accountable system. This architecture assigns to each node in the system, a set of nodes called monitors. Periodically each node is monitored by its set of monitors.We theoretically prove that our protocol is a Nash equilibrium, i.e., nodes do not have any interest in deviating from it.This kind of protocol being costly in terms of messages exchanged, we are interested to the theoretic study of different techniques of monitors management. The objective of this study is to identify conditions on protocol parameters for which a method of management is more appropriate than another.Furthermore, we practically evaluate FullReview by deploying it for enforcing accountability in two applications: (1) SplitStream, an efficient multicast protocol for live streaming, and (2) Onion Routing, the most widely used anonymous communication protocol. Performance evaluation shows that FullReview effectively detects faults in presence of rational nodes while introducing a small overhead compared to PeerReview and scaling as PeerReview
Books on the topic "Tolérance aux fautes byzantines"
European Dependable Computing Conference (1st 1994 Berlin, Germany). Dependable computing--EDCC-1: First European Dependable Computing Conference, Berlin, Germany, October 4-6, 1994 : proceedings. Berlin: Springer-Verlag, 1994.
Find full textInternational Symposium on Fault-Tolerant Computing (23rd 1993 Toulouse, France). FTCS-23: Digest of papers : the Twenty-third International Symposium on Fault-Tolerant Computing, June 22-24, 1993, Toulouse, France. Washington, D.C: IEEE Computer Society Press, 1993.
Find full text1979-, Ye Dan, ed. Reliable control and filtering of linear systems with adaptive mechanisms. Boca Raton: Taylor & Francis, 2011.
Find full textISARCS 2010 (2010 Prague, Czech Republic). Architecting critical systems: First international symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 : proceedings. Berlin: Springer, 2010.
Find full textMarie, Healy Ann, ed. Resilience: The science of why things bounce back. New York: Free Press, 2012.
Find full textKim, Fowler, ed. Mission-critical and safety-critical systems handbook: Design and development for embedded applications. Amsterdam: Newnes, 2010.
Find full textKim, Fowler, ed. Mission-critical and safety-critical systems handbook: Design and development for embedded applications. Amsterdam: Newnes, 2010.
Find full text1949-, Patton Ron, Clark Robert 1925-, and Frank Paul M, eds. Issues of fault diagnosis for dynamic systems. London: Springer, 2000.
Find full textIEEE Computer Society. Dependable Systems and Networks (Dsn 2001)(Formerly Ftcs): 2001 International Conference on. Institute of Electrical & Electronics Enginee, 2001.
Find full textIEEE Computer Society. Dependable Systems and Networks (Dsn 2001)(Formerly Ftcs): 2001 International Conference on. Institute of Electrical & Electronics Enginee, 2001.
Find full textBook chapters on the topic "Tolérance aux fautes byzantines"
SIMANI, Silvio. "Méthodes guidées par les données pour le diagnostic de défauts." In Diagnostic et commande à tolérance de fautes 1, 167–233. ISTE Group, 2024. http://dx.doi.org/10.51926/iste.9058.ch5.
Full text