請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/86615
標題: | 拜占庭容錯協議之同步器的攻擊與防禦 Attacking and Protecting View Synchronizers of Byzantine Fault-Tolerant Protocols |
作者: | Ping-Lun Wang 王秉倫 |
指導教授: | 蕭旭君(Hsu-Chun Hsiao) |
關鍵字: | 拜占庭容錯協議,同步器, BFT Protocol,View Synchronizer, |
出版年 : | 2022 |
學位: | 碩士 |
摘要: | 許多拜占庭容錯協議仰賴於一個誠實的領導者指揮其他節點以達成共識。為了選舉出目前的領導者,HotStuff提出一個使用pacemaker的架構,並以此確保在有限時間內節點們一定會達成共識。這篇論文檢視了HotStuff的實作並找出其無法讓節點完成同步的安全性漏洞。針對這個漏洞,我們提出了兩個攻擊使得HotStuff在攻擊成功後無法達成任何共識。除此之外,其中一個攻擊方法不但能在固定的時間內完成,也只需要一個惡意節點就能達成攻擊,而這個特性是在任意節點數量下的系統都能符合。對此,我們也提出了一個有效的防禦方式來補足HotStuff的不足。 Leader-based Byzantine Fault-Tolerant (BFT) protocols heavily rely on an honest leader to guide other nodes to reach a consensus. To elect the current leader, the HotStuff BFT protocol proposed to use a pacemaker, which also ensures the liveness of the BFT protocol. In this paper, we carefully inspected HotStuff BFT and discovered that their pacemaker implementation contains a serious vulnerability that prevents the honest nodes to synchronize to the same leader. This allows us to construct two liveness attacks, Freezer attack and Constant-time Freezer attack, that stop HotStuff BFT from reaching any consensus. Notably, the Constant-time Freezer attack can be carried out in constant time, disregarding the number of honest nodes, and one single Byzantine node can launch this attack. In correspond to this security vulnerability, we design a secure and efficient view doubling synchronizer that provides protections to HotStuff's pacemaker and has comparable efficiency as other existing view synchronizers. |
URI: | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/86615 |
DOI: | 10.6342/NTU202202006 |
全文授權: | 同意授權(全球公開) |
電子全文公開日期: | 2026-08-08 |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
U0001-0308202213285500.pdf 此日期後於網路公開 2026-08-08 | 1.9 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。