Sisi Duan
YOU?
Author Swipe
View article: Timestamp Manipulation: Timestamp-based Nakamoto-style Blockchains are Vulnerable
Timestamp Manipulation: Timestamp-based Nakamoto-style Blockchains are Vulnerable Open
Nakamoto consensus are the most widely adopted decentralized consensus mechanism in cryptocurrency systems. Since it was proposed in 2008, many studies have focused on analyzing its security. Most of them focus on maximizing the profit of …
View article: FigStep: Jailbreaking Large Vision-Language Models via Typographic Visual Prompts
FigStep: Jailbreaking Large Vision-Language Models via Typographic Visual Prompts Open
Large Vision-Language Models (LVLMs) signify a groundbreaking paradigm shift within the Artificial Intelligence (AI) community, extending beyond the capabilities of Large Language Models (LLMs) by assimilating additional modalities (e.g., …
View article: PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery Open
We design and implement PG, a Byzantine fault-tolerant and privacy-preserving multi-sensor fusion system. PG is flexible and extensible, supporting a variety of fusion algorithms and application scenarios. On the theoretical side, PG devel…
View article: Asynchronous Consensus without Trusted Setup or Public-Key Cryptography
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography Open
View article: Blockchain for digital healthcare: Case studies and adoption challenges
Blockchain for digital healthcare: Case studies and adoption challenges Open
View article: Dashing and Star: Byzantine Fault Tolerance with Weak Certificates
Dashing and Star: Byzantine Fault Tolerance with Weak Certificates Open
State-of-the-art Byzantine fault-tolerant (BFT) protocols assuming partial synchrony such as SBFT and HotStuff use regular certificates obtained from 2f + 1 (partial) signatures. We show that one can use weak certificates obtained from onl…
View article: FigStep: Jailbreaking Large Vision-Language Models via Typographic Visual Prompts
FigStep: Jailbreaking Large Vision-Language Models via Typographic Visual Prompts Open
Large Vision-Language Models (LVLMs) signify a groundbreaking paradigm shift within the Artificial Intelligence (AI) community, extending beyond the capabilities of Large Language Models (LLMs) by assimilating additional modalities (e.g., …
View article: Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura
Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura Open
As blockchain-based commercial projects and startups flourish, efficiency becomes one of the critical metrics in designing blockchain systems. Due to its high efficiency, Proof of Authority (PoA) Aura has become one of the most widely adop…
View article: PACE
PACE Open
The classic asynchronous Byzantine fault tolerance (BFT) framework of Ben-Or, Kemler, and Rabin (BKR) and its descendants rely on reliable broadcast (RBC) and asynchronous binary agreement (ABA). However, BKR does not allow all ABA instanc…
View article: Recent progress on BFT in the era of blockchains
Recent progress on BFT in the era of blockchains Open
This perspective highlights some recent progress on the research of Byzantine fault tolerant (BFT) consensus protocol in the era of blockchains, including both partially synchronous BFT and asynchronous BFT protocols, their fundamental bui…
View article: BFT in Blockchains: From Protocols to Use Cases
BFT in Blockchains: From Protocols to Use Cases Open
A blockchain is a distributed system that achieves strong security guarantees in storing, managing, and processing data. All blockchains achieve a common goal: building a decentralized system that provides a trustworthy service in an untru…
View article: A Framework for Evaluating BFT
A Framework for Evaluating BFT Open
We present a framework for evaluating the performance of Byzantine fault-tolerant (BFT) protocols theoretically. Our motivation is to identify protocols suitable for a particular power grid application. In this application, replicas are lo…
View article: MiB: Asynchronous BFT with More Replicas
MiB: Asynchronous BFT with More Replicas Open
State-of-the-art asynchronous Byzantine fault-tolerant (BFT) protocols, such as HoneyBadgerBFT, BEAT, and Dumbo, have shown a performance comparable to partially synchronous BFT protocols. This paper studies two practical directions in asy…
View article: Blockchains for Government
Blockchains for Government Open
Blockchain is the technology used by developers of cryptocurrencies, like Bitcoin, to enable exchange of financial “coins” between participants in the absence of a trusted third party to ensure the transaction, such as is typically done by…
View article: Demo Abstract: ByzGame, a Visualized and Understandable BFT Consensus
Demo Abstract: ByzGame, a Visualized and Understandable BFT Consensus Open
Byzantine Fault Tolerance (BFT) is the only generic technique that tolerates arbitrary failures in distributed systems, and can be used as a core primitive in building consensus in blockchains. Numerous BFT protocols have been proposed to …
View article: Revisiting hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost
Revisiting hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost Open
FaB Paxos sets a lower bound of 5f + 1 replicas for any two-step consensus protocols tolerating f byzantine failures. Yet, hBFT promises a two-step consensus protocol with only 3f + 1 replicas. As a result, it violates safety property of a…
View article: Revisiting hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost
Revisiting hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost Open
FaB Paxos[5] sets a lower bound of 5f + 1 replicas for any two-step consensus protocols tolerating f byzantine failures. Yet, hBFT[3] promises a two-step consensus protocol with only 3f + 1 replicas. As a result, it violates safety propert…
View article: Best effort broadcast under cascading failures in interdependent critical infrastructure networks
Best effort broadcast under cascading failures in interdependent critical infrastructure networks Open
View article: HotSpots
HotSpots Open
Critical Infrastructure Systems such as transportation, water and power grid systems are vital to our national security, economy, and public safety. Recent events, like the 2012 hurricane Sandy, show how the interdependencies among differe…