Peiyao Sheng: BFT Protocol Forensics | Chainlink Research Reports
Chainlink Chainlink
70K subscribers
990 views
0

 Published On Oct 4, 2021

BFT Protocol Forensics by Peiyao Sheng, from the University of Illinois

Paper link: https://arxiv.org/pdf/2010.06785.pdf

BFT Protocol Forensics mathematically formalizes the study of forensic
support for Byzantine fault-tolerant (BFT) protocols. The authors use distributed techniques to identify several malicious replicas and find that forensic support of BFT protocols depends heavily on minor implementation details that do not impact the protocol’s security or complexity.

Peiyao Sheng is a Doctoral student at the University of Illinois in Computer Science studying consensus protocols using externally valid research design.

Chainlink Research Reports presents research that informs the smart contract and blockchain oracle industry presented by expert researchers building Chainlink, smart contract, and blockchain systems throughout the computer science, economics, and related fields.

Chainlink is the industry standard oracle network for powering hybrid smart contracts. Chainlink Decentralized Oracle Networks provide developers with the largest collection of high-quality data sources and secure off-chain computations to expand the capabilities of smart contracts on any blockchain.

Learn more about Chainlink:
Website: https://chain.link
Docs: https://docs.chain.link
Twitter:   / chainlink  
Discord: https://discordapp.com/invite/aSK4zew
Newsletter: https://chn.lk/newsletter
Telegram: https://t.me/chainlinkofficial
Talk to an expert: http://chn.lk/contact

#chainlink #blockchainresearch #computerscience

00:00 Introducing Peiyao Sheng
01:14 BFT Protocol Introduction
02:10 Forensics
03:30 Intuition For Forensics
04:31 Case Study: HotStuff
07:21 Cross View Attacks
11:19 Strong Forensic Support
11:57 Small Distinctions Have Outsized Impact
14:25 No Forensic Support For Algorand
17:02 What Impairs Forensic Support?
17:24 Transition Certificate
19:46 Trade-Offs For Strong Forensic Support
22:02 Analytic Indicators Detecting Attacks
23:03 Scalability Implications
25:30 Findings On Proof-of-Stake Blockchains
28:48 Forensic Support To Investigate Attacks

show more

Share/Embed