Skip to main content

Showing 1–19 of 19 results for author: Loo, B T

.
  1. arXiv:2408.06432  [pdf, other

    cs.DC

    BFTBrain: Adaptive BFT Consensus with Reinforcement Learning

    Authors: Chenyuan Wu, Haoyun Qin, Mohammad Javad Amiri, Boon Thau Loo, Dahlia Malkhi, Ryan Marcus

    Abstract: This paper presents BFTBrain, a reinforcement learning (RL) based Byzantine fault-tolerant (BFT) system that provides significant operational benefits: a plug-and-play system suitable for a broad set of hardware and network configurations, and adjusts effectively in real-time to changing fault scenarios and workloads. BFTBrain adapts to system conditions and application needs by switching between… ▽ More

    Submitted 12 August, 2024; originally announced August 2024.

    Comments: To appear in 22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI), April 2025

  2. arXiv:2211.14585  [pdf, other

    cs.SE

    Safety Verification of Declarative Smart Contracts

    Authors: Haoxian Chen, Lan Lu, Brendan Massey, Yuepeng Wang, Boon Thau Loo

    Abstract: Smart contracts manage a large number of digital assets nowadays. Bugs in these contracts have led to significant financial loss. Verifying the correctness of smart contracts is, therefore, an important task. This paper presents an automated safety verification tool, DCV, that targets declarative smart contracts written in DeCon, a logic-based domain-specific language for smart contract implementa… ▽ More

    Submitted 2 August, 2023; v1 submitted 26 November, 2022; originally announced November 2022.

  3. AdaChain: A Learned Adaptive Blockchain

    Authors: Chenyuan Wu, Bhavana Mehta, Mohammad Javad Amiri, Ryan Marcus, Boon Thau Loo

    Abstract: This paper presents AdaChain, a learning-based blockchain framework that adaptively chooses the best permissioned blockchain architecture in order to optimize effective throughput for dynamic transaction workloads. AdaChain addresses the challenge in the Blockchain-as-a-Service (BaaS) environments, where a large variety of possible smart contracts are deployed with different workload characteristi… ▽ More

    Submitted 17 July, 2023; v1 submitted 3 November, 2022; originally announced November 2022.

  4. arXiv:2207.13827  [pdf, other

    cs.SE

    Declarative Smart Contracts

    Authors: Haoxian Chen, Gerald Whitters, Mohammad Javad Amiri, Yuepeng Wang, Boon Thau Loo

    Abstract: This paper presents DeCon, a declarative programming language for implementing smart contracts and specifying contract-level properties. Driven by the observation that smart contract operations and contract-level properties can be naturally expressed as relational constraints, DeCon models each smart contract as a set of relational tables that store transaction records. This relational representat… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  5. arXiv:2207.10746  [pdf

    cs.DC

    Templating Shuffles

    Authors: Qizhen Zhang, Jiacheng Wu, Ang Chen, Vincent Liu, Boon Thau Loo

    Abstract: Cloud data centers are evolving fast. At the same time, today's large-scale data analytics applications require non-trivial performance tuning that is often specific to the applications, workloads, and data center infrastructure. We propose TeShu, which makes network shuffling an extensible unified service layer common to all data analytics. Since an optimal shuffle depends on a myriad of factors,… ▽ More

    Submitted 10 January, 2023; v1 submitted 21 July, 2022; originally announced July 2022.

    Comments: The technical report of TeShu, which has been accepted at CIDR 2023

    MSC Class: 68M14 ACM Class: C.2.4

  6. arXiv:2205.04534  [pdf, other

    cs.DC

    The Bedrock of Byzantine Fault Tolerance: A Unified Platform for BFT Protocol Design and Implementation

    Authors: Mohammad Javad Amiri, Chenyuan Wu, Divyakant Agrawal, Amr El Abbadi, Boon Thau Loo, Mohammad Sadoghi

    Abstract: Byzantine Fault-Tolerant (BFT) protocols have recently been extensively used by decentralized data management systems with non-trustworthy infrastructures, e.g., permissioned blockchains. BFT protocols cover a broad spectrum of design dimensions from infrastructure settings such as the communication topology, to more technical features such as commitment strategy and even fundamental social choice… ▽ More

    Submitted 3 August, 2022; v1 submitted 9 May, 2022; originally announced May 2022.

  7. arXiv:2110.06303  [pdf, other

    cs.SE cs.PL

    NetRep: Automatic Repair for Network Programs

    Authors: Lei Shi, Yuepeng Wang, Rajeev Alur, Boon Thau Loo

    Abstract: Debugging imperative network programs is a challenging task for developers because understanding various network modules and complicated data structures is typically time-consuming. To address the challenge, this paper presents an automated technique for repairing network programs from unit tests. Specifically, given as input a faulty network program and a set of unit tests, our approach localizes… ▽ More

    Submitted 20 October, 2021; v1 submitted 12 October, 2021; originally announced October 2021.

    Comments: 24 pages, 9 figures

  8. arXiv:2107.10836  [pdf, other

    cs.DB

    Qanaat: A Scalable Multi-Enterprise Permissioned Blockchain System with Confidentiality Guarantees

    Authors: Mohammad Javad Amiri, Boon Thau Loo, Divyakant Agrawal, Amr El Abbadi

    Abstract: Today's large-scale data management systems need to address distributed applications' confidentiality and scalability requirements among a set of collaborative enterprises. This paper presents Qanaat, a scalable multi-enterprise permissioned blockchain system that guarantees the confidentiality of enterprises in collaboration workflows. Qanaat presents data collections that enable any subset of en… ▽ More

    Submitted 17 July, 2022; v1 submitted 22 July, 2021; originally announced July 2021.

    Journal ref: Proceedings of the VLDB Endowment 15, no. 11 (2022)

  9. arXiv:2101.08819  [pdf, other

    cs.DB cs.NI

    Saguaro: An Edge Computing-Enabled Hierarchical Permissioned Blockchain

    Authors: Mohammad Javad Amiri, Ziliang Lai, Liana Patel, Boon Thau Loo, Eric Lo, Wenchao Zhou

    Abstract: We present Saguaro, a permissioned blockchain system designed specifically for edge computing networks. Saguaro leverages the hierarchical structure of edge computing networks to reduce the overhead of wide-area communication by presenting several techniques. First, Saguaro proposes coordinator-based and optimistic protocols to process cross-domain transactions with low latency where the lowest co… ▽ More

    Submitted 14 September, 2022; v1 submitted 21 January, 2021; originally announced January 2021.

  10. arXiv:2010.06135  [pdf, other

    cs.PL cs.CR

    Session-layer Attack Traffic Classification by Program Synthesis

    Authors: Lei Shi, Yahui Li, Rajeev Alur, Boon Thau Loo

    Abstract: Writing classification rules to identify malicious network traffic is a time-consuming and error-prone task. Learning-based classification systems automatically extract such rules from positive and negative traffic examples. However, due to limitations in the representation of network traffic and the learning strategy, these systems lack both expressiveness to cover a range of attacks and interpre… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: 13 pages

  11. arXiv:2009.04586  [pdf, other

    cs.NI cs.DL

    RapidLearn: A General Purpose Toolkit for Autonomic Networking

    Authors: Jatin Sharma, Nikhilesh Behera, Priya Venkatraman, Boon Thau Loo

    Abstract: Software Defined Networking has unfolded a new area of opportunity in distributed networking and intelligent networks. There has been a great interest in performing machine learning in distributed setting, exploiting the abstraction of SDN which makes it easier to write complex ML queries on standard control plane. However, most of the research has been made towards specialized problems (security,… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

    Comments: 5 pages, 7 figures

  12. arXiv:1812.00109  [pdf, other

    cs.NI

    Sunstar: A Cost-effective Multi-Server Solution for Reliable Video Delivery

    Authors: Behnaz Arzani, Nicholas Iodice, Steven Hwang, Prahalad Venkataramanan, Roch Geurin, Boon Thau Loo

    Abstract: In spite of much progress and many advances, cost-effective, high-quality video delivery over the internet remains elusive. To address this ongoing challenge, we propose Sunstar, a solution that leverages simultaneous downloads from multiple servers to preserve video quality. The novelty in Sunstar is not so much in its use of multiple servers but in the design of a schedule that balances improvem… ▽ More

    Submitted 30 November, 2018; originally announced December 2018.

  13. arXiv:1802.07222  [pdf, other

    cs.NI

    007: Democratically Finding The Cause of Packet Drops

    Authors: Behnaz Arzani, Selim Ciraci, Luiz Chamon, Yibo Zhu, Hingqiang Liu, Jitu Padhye, Boon Thau Loo, Geoff Outhred

    Abstract: Network failures continue to plague datacenter operators as their symptoms may not have direct correlation with where or why they occur. We introduce 007, a lightweight, always-on diagnosis application that can find problematic links and also pinpoint problems for each TCP connection. 007 is completely contained within the end host. During its two month deployment in a tier-1 datacenter, it detect… ▽ More

    Submitted 20 February, 2018; originally announced February 2018.

    Comments: 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18).USENIX Association, 2018

  14. arXiv:1511.08791  [pdf, other

    cs.NI

    FixRoute: A Unified Logic and Numerical Tool for Provably Safe Internet Traffic Engineering

    Authors: Behnaz Arzani, Alexander Gurney, Bo Li, Xianglong Han, Roch Guerin, Boon Thau Loo

    Abstract: The performance of networks that use the Internet Protocol is sensitive to precise configuration of many low-level parameters on each network device. These settings govern the action of dynamic routing protocols, which direct the flow of traffic; in order to ensure that these dynamic protocols all converge to produce some 'optimal' flow, each parameter must be set correctly. Multiple conflicting o… ▽ More

    Submitted 27 November, 2015; originally announced November 2015.

  15. A Program Logic for Verifying Secure Routing Protocols

    Authors: Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, Boon Thau Loo

    Abstract: The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done to understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such as Secure BGP (S-BGP). In this paper, we develop a sound program logic for SANDLog-a declarative specification language for secure routing protocols for verifying properties of these protoco… ▽ More

    Submitted 27 December, 2015; v1 submitted 13 October, 2015; originally announced October 2015.

    Journal ref: Logical Methods in Computer Science, Volume 11, Issue 4 (December 29, 2015) lmcs:1620

  16. arXiv:1409.6288  [pdf, other

    cs.DB

    Enabling Incremental Query Re-Optimization

    Authors: Mengmeng Liu, Zachary G. Ives, Boon Thau Loo

    Abstract: As declarative query processing techniques expand in scope --- to the Web, data streams, network routers, and cloud platforms --- there is an increasing need for adaptive query processing techniques that can re-plan in the presence of failures or unanticipated performance changes. A status update on the data distributions or the compute nodes may have significant repercussions on the choice of whi… ▽ More

    Submitted 22 September, 2014; originally announced September 2014.

  17. arXiv:1312.7314  [pdf, ps, other

    nucl-ex

    Measurements of Fission Products from the Fukushima Daiichi Incident in San Francisco Bay Area Air Filters, Automobile Filters, Rainwater, and Food

    Authors: A. R. Smith, K. J. Thomas, E. B. Norman, D. L. Hurley, B. T. Lo, Y. D. Chan, P. V. Guillaumon, B. G. Harvey

    Abstract: A variety of environmental media were analyzed for fallout radionuclides resulting from the Fukushima nuclear accident by the Low Background Facility (LBF) at the Lawrence Berkeley National Laboratory (LBNL) in Berkeley, CA. Monitoring activities in air and rainwater began soon after the onset of the March 11, 2011 tsunami and are reported here through the end of 2012. Observed fallout isotopes in… ▽ More

    Submitted 27 December, 2013; originally announced December 2013.

    Comments: 11 pages

  18. arXiv:1204.6080  [pdf, other

    cs.DB

    Cologne: A Declarative Distributed Constraint Optimization Platform

    Authors: Changbin Liu, Lu Ren, Boon Thau Loo, Yun Mao, Prithwish Basu

    Abstract: This paper presents Cologne, a declarative optimization platform that enables constraint optimization problems (COPs) to be declaratively specified and incrementally executed in distributed systems. Cologne integrates a declarative networking engine with an off-the-shelf constraint solver. We have developed the Colog language that combines distributed Datalog used in declarative networking with la… ▽ More

    Submitted 26 April, 2012; originally announced April 2012.

    Comments: VLDB2012

    Journal ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 8, pp. 752-763 (2012)

  19. arXiv:0909.1759  [pdf

    cs.CR cs.DB

    Declarative Reconfigurable Trust Management

    Authors: William Marczak, David Zook, Wenchao Zhou, Molham Aref, Boon Thau Loo

    Abstract: In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement of security policies. These systems have different tradeoffs in expressiveness and complexity, depending on the security constructs (e.g. authentication, delegation, secrecy, etc.) that are supported, and the assumed tr… ▽ More

    Submitted 9 September, 2009; originally announced September 2009.

    Comments: CIDR 2009