{"type":"conference","year":"2011","author":[{"id":"584C6850-E996-11E9-805B-F01764644770","first_name":"Raluca","full_name":"Halalai, Raluca","last_name":"Halalai"},{"orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A","last_name":"Henzinger","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Singh, Vasu","last_name":"Singh","id":"4DAE2708-F248-11E8-B48F-1D18A9856A87","first_name":"Vasu"}],"ddc":["000","004"],"department":[{"_id":"ToHe"}],"title":"Quantitative evaluation of BFT protocols","_id":"3355","month":"10","date_updated":"2021-01-12T07:42:53Z","page":"255 - 264","date_created":"2018-12-11T12:02:51Z","has_accepted_license":"1","file":[{"date_updated":"2020-07-14T12:46:09Z","creator":"system","date_created":"2018-12-12T10:07:49Z","content_type":"application/pdf","relation":"main_file","file_id":"4648","file_name":"IST-2012-84-v1+1_Quantitative_evaluation_of_BFT_protocols.pdf","checksum":"4dc8750ab7921f51de992000b13d1b01","file_size":272017,"access_level":"open_access"}],"publication_status":"published","oa_version":"Submitted Version","oa":1,"day":"13","status":"public","date_published":"2011-10-13T00:00:00Z","quality_controlled":"1","pubrep_id":"84","language":[{"iso":"eng"}],"publisher":"IEEE","abstract":[{"lang":"eng","text":"Byzantine Fault Tolerant (BFT) protocols aim to improve the reliability of distributed systems. They enable systems to tolerate arbitrary failures in a bounded number of nodes. BFT protocols are usually proven correct for certain safety and liveness properties. However, recent studies have shown that the performance of state-of-the-art BFT protocols decreases drastically in the presence of even a single malicious node. This motivates a formal quantitative analysis of BFT protocols to investigate their performance characteristics under different scenarios. We present HyPerf, a new hybrid methodology based on model checking and simulation techniques for evaluating the performance of BFT protocols. We build a transition system corresponding to a BFT protocol and systematically explore the set of behaviors allowed by the protocol. We associate certain timing information with different operations in the protocol, like cryptographic operations and message transmission. After an elaborate state exploration, we use the time information to evaluate the performance characteristics of the protocol using simulation techniques. We integrate our framework in Mace, a tool for building and verifying distributed systems. We evaluate the performance of PBFT using our framework. We describe two different use-cases of our methodology. For the benign operation of the protocol, we use the time information as random variables to compute the probability distribution of the execution times. In the presence of faults, we estimate the worst-case performance of the protocol for various attacks that can be employed by malicious nodes. Our results show the importance of hybrid techniques in systematically analyzing the performance of large-scale systems."}],"publist_id":"3260","file_date_updated":"2020-07-14T12:46:09Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","doi":"10.1109/QEST.2011.40","scopus_import":1,"conference":{"end_date":"2011-09-08","name":"QEST: Quantitative Evaluation of Systems","start_date":"2011-09-05","location":"Aachen, Germany"},"citation":{"ieee":"R. Halalai, T. A. Henzinger, and V. Singh, “Quantitative evaluation of BFT protocols,” presented at the QEST: Quantitative Evaluation of Systems, Aachen, Germany, 2011, pp. 255–264.","ama":"Halalai R, Henzinger TA, Singh V. Quantitative evaluation of BFT protocols. In: IEEE; 2011:255-264. doi:10.1109/QEST.2011.40","chicago":"Halalai, Raluca, Thomas A Henzinger, and Vasu Singh. “Quantitative Evaluation of BFT Protocols,” 255–64. IEEE, 2011. https://doi.org/10.1109/QEST.2011.40.","short":"R. Halalai, T.A. Henzinger, V. Singh, in:, IEEE, 2011, pp. 255–264.","apa":"Halalai, R., Henzinger, T. A., & Singh, V. (2011). Quantitative evaluation of BFT protocols (pp. 255–264). Presented at the QEST: Quantitative Evaluation of Systems, Aachen, Germany: IEEE. https://doi.org/10.1109/QEST.2011.40","mla":"Halalai, Raluca, et al. Quantitative Evaluation of BFT Protocols. IEEE, 2011, pp. 255–64, doi:10.1109/QEST.2011.40.","ista":"Halalai R, Henzinger TA, Singh V. 2011. Quantitative evaluation of BFT protocols. QEST: Quantitative Evaluation of Systems, 255–264."}}