Tutorials


Byzantine State Machine Replication in the age of Blockchains: fundamentals and recent results

Duration: Half Day - 27 June, 09:00-12:30

Room: Presidente

Abstract: The success of Bitcoin and other blockchains led to a renewed interest in Byzantine fault-tolerant (BFT) state machine replication (SMR) protocols, with many recent contributions from industry and academia. In this tutorial, we will present some fundamentals on the topic, including baseline consensus protocols such as PBFT and HotStuff, and how they can be used for building practical SMR and blockchain systems. In the second part, we will discuss advanced topics addressed in recent works. The objective is not to be extensive, especially in the 2nd part, but to mention key problems and give pointers about state-of-the-art solutions and open issues.

Bios

Alysson Bessani is an Associate Professor of the University of Lisbon Faculty of Sciences, Portugal, and the director of LASIGE research unit. He received his Ph.D. in Electrical Engineering from UFSC (Brazil) in 2006, was a visiting professor at Carnegie Mellon University (2010) and a visiting researcher at Microsoft Research Cambridge (2014). Alysson coordinated/collaborated in ten international projects and co-authored more than 100 peer-reviewed publications on dependability, security, Byzantine fault tolerance, and cloud storage. He is also the principal researcher behind the BFT-SMaRt consensus library (http://bft-smart.github.io/library/) and a co-founder of the Vawlt dependable & secure cloud storage startup (https://vawlt.io). More information about him can be found in http://www.di.fc.ul.pt/~bessani.



Quantum Computing Reliability: Problems, Tools, and Potential Solutions

Duration: Half Day - 27 June, 14:00-18:30

Room: Presidente

Abstract: Quantum computing is a new computational paradigm, expected to revolutionize the computing field in the next few years. Qubits, the atomic units of a quantum circuit, exploit the quantum physics properties to increase the parallelism and speed of computation. Unfortunately, qubits are both intrinsically noisy and highly susceptible to external sources of faults, such as ionizing radiation. The latest discoveries highlight a much higher radiation sensitivity of qubits than traditional transistors and identify a much more complex fault model than bit-flip. The observed error rate is so high that researchers are questioning the large-scale adoption of quantum computers. The reliability and dependability community is asked to act to find innovative solutions to improve the reliability of quantum applications. This tutorial aims at providing the DSN community with the tools to do so and to train the attendees on quantum fault injection.
This tutorial provides the audience with all information and background needed to understand quantum computing basics, to design a quantum circuit, to simulate a quantum execution, and to understand the obtained result. We treat quantum computing as an operative computing architecture, focusing on its utilization rather than on its physical and tech- nological implementation. Then, we will present the available correction codes and the open challenges that the reliability community is asked to address. The tutorial considers both the intrinsic noise, that has a predictable and incremental effect, and radiation-induced transient faults, that are stochastic and modify the qubit in an unpredictable way.
After completing the overview of available technology and of the open challenges, this tutorial presents, with an hands- on session that include examples of utilization, the Quantum Fault Injector (QuFI) framework. QuFI is an easy-to-use fault injector able to identify the quantum circuits sensitivity to faults and the probability for a fault in a qubit to propagate to the output. Based on the latest studies and radiation experi- ments performed on real quantum machines, QuFI models the transient faults in a qubit as a phase shift with a parametrized magnitude. QuFI is highly flexible, as it can be used on both quantum circuit simulators and real quantum machines. As we show, this framework allows to choose any quantum algorithm to be analyzed, and it is possible to identify the faults and qubits that are more likely to impact its output.

Bios

Edoardo Giusto, PhD (Member IEEE) obtained the B.S. degree in 2015, M.S. degree in 2017, and PhD degree in 2021 from Politecnico di Torino. He is currently a PostDoctoral Research Assistant at the Department of Control and Computer Engineering at Politecnico di Torino. His research interests include Internet of Things and Quantum Computing. He is a Lecturer for the 2nd level Master Course Quantum Communication and Computing organized by TIM S.p.A. and Politecnico di Torino.
Emanuele Dri is a Ph.D. student in Quantum Computing at Politecnico di Torino, Italy, since 2021. He received his master’s degree in Data Science and Engineering at Politecnico in 2021, with a thesis on Machine Learning for text classification. Recently, his research focused on the reliability of quantum circuits with respect to transient faults and on developing and adapting quantum algorithms for the finance sector, helping in bridging the gap between academic research and industry.
Devesh Tiwari is educator and researcher at Northeastern University where he directs the Goodwill Computing Lab. His group innovates new solutions to make large-scale classical computing systems and quantum computing systems more efficient, reliable, and cost-effective. Before joining the North- eastern faculty, Devesh was a staff scientist at the United States Department of Energy (DOE) Oak Ridge National Laboratory. Devesh was recognized with multiple awards including the DSN Dependability Rising Star Award, the NSF CAREER Award, and the Facebook Faculty Research Award. Devesh’s research group has lowered the barrier to entry and accelerated the R&D efforts in multiple emerging computer systems areas including HPC, quantum system software, serverless computing, and AI-driven data center optimizations, via open- sourcing novel software artifacts and datasets. He was rec- ognized with the TPDS Editorial Excellence Award for his exceptional contributions to the TPDS journal as an editor, and as the Professor of Year at Northeastern University IEEE Student Chapter.
Betis Baheri received his B.S. degree in Computer Science from Kent State University, in 2018, and the M.S in computer science from Kent State University in 2020. His area of research while he was in Undergraduate was security and privacy. For his master he focused on HPC systems. Previously he was working on HPC scheduler and currently he is pursuing Ph.D. degree in Computer Science at same university in quantum computing and HPC systems. His main research focus is quantum error correction, quantum deep learning, and quantum machine learning on NISQ and Ion based quantum computers.
Qiang Guan received his Ph.D. degree from the University of North Texas, in 2014. Since 2018, Qiang is an assistant professor at Kent State University in the department of com- puter science. Qiang was a computer scientist at the Los Alamos National Laboratory. Qiang is the recipient of the NSF CAREER Award in 2023. He has been awarded more than $3.5 Millions from the National Science Foundation (NSF) across the areas of High Performance Computing, Quantum Computing, AI, and VR/AR.
Bartolomeo Montrucchio received the M.Sc. degree in electronic engineering and the Ph.D. degree in computer engineering from Politecnico di Torino, Turin, Italy, in 1998, and 2002, respectively. He is currently a Full Professor of Computer Engineering with the Dipartimento di Automatica e Informatica, Politecnico di Torino. His current research interests include image analysis and synthesis techniques, scientific visualization, sensor networks, RFIDs, and quantum computing.
Paolo Rech received his master and Ph.D. degrees from Padova University, Padova, Italy, in 2006 and 2009, respec- tively. Since 2022 Paolo is an associate professor at Universita` di Trento, Italy, and since 2012 he is an associate professor at UFRGS, Brazil. He received 5 best paper awards, including the best paper at the 2022 IEEE Nuclear and Space Radiation Effects Conference for the paper ”Radiation-Induced Faults Propagation in Quantum Bits and Quantum Circuits”. He is the 2019 Rosen Scholar Fellow at the Los Alamos National Laboratory, he received the 2020 impact in society award from the Rutherford Appleton Laboratory, UK and the Marie Curie Fellowship from the European Commission.



Using the seL4 Microkernel

Duration: Half Day - 27 June, 11:00-16:00

Room: Galeria

Abstract: The seL4 microkernel [2] is the first general-purpose operating system (OS) kernel with a formal proof of im- plementation correctness. By now, its verification covers functional correctness to the binary (taking the compiler out of the trust chain), proofs of security enforcement and worst- case execution-time bounds, and span three architectures (32-bit Arm and 64-bit RISC-V and x86) [1]. All this while featuring unbeaten performance. seL4 is now being deployed in safety- and security-critical systems around the world, and is backed by the non-profit seL4 Foundation [3]. However, the generality of seL4 and its intentionally primitive, low-level API (which enabled much of the verifi- cation work) makes deployment challenging, even for expe- rienced engineers; even getting a hello-world program to run can be a challenge. For this reason, the seL4 Core Platform (seL4CP) [4] has been developed, a minimal OS framework dramatically reduces the barrier to uptake, at the cost of restricting use to static system architectures; a restriction that is compatible with most embedded/IoT/cyberphysical systems. The seL4CP forms the basis of a more complete (and verifiable) OS that is currently being developed by the Trustworthy Systems group at UNSW Sydney. This tutorial will consist of two parts. The first, running for about 1h, will provide an introduction to seL4 and the seL4CP, including a high-level explanation of seL4’s verification story. The second part is a hands-on tutorial for developing seL4/seL4CP-based systems. The hands-on work will be on standard laptops, we will provide setup instructions for those who want to hit the ground running

Bios

Gernot Heiser is Scientia (distinguished) Professor and John Lions Chair of Operating Systems at UNSW Sydney. His research interest are in operating systems, real-time systems, security and safety. His research vision is to completely change the cybersecurity game from playing catch-up with attackers to systems that are provably secure. As leader the Trustworthy Systems group, he pioneered large-scale formal verification of systems code, specifically the design, implementation and formal verification of the seL4 microkernel; seL4 is now being used in real-world security- and safety-critical systems. Heiser’s former company Open Kernel Labs, acquired by General Dynamics in 2012, marketed the OKL4 micro- kernel, which shipped on billions of mobile wireless chips and is deployed on the secure enclave of all iOS devices. He presently serves as Chief Scientist of Neutrality, and Chairman of the seL4 Foundation. Gernot is a Fellow of the ACM, the IEEE, the Australian Academy of Technology and Engineering (ATSE) and the Royal Society of New South Wales (RSN) and a member of the German Academy of Sciences Leopoldina. He is also an ACM Distinguished Lecturer and an IEEE Distinguished Visitor.
Ivan Velickovic is an operating systems engineer at the Trustworthy Systems research group at UNSW Sydney. His current work is primarily on virtualisation and device drivers on seL4. Specifically, his goal is to de- velop and make use of a minimal OS framework on top of seL4 called the seL4 Core Platform to enable reliable and performant virtual machines and device drivers.



Awesome Trusted Execution Environment

Duration: Half Day - 27 June, 14:00-18:30

Room: Reuniões

Abstract: While protection of data at-rest and data in-transit can be achieved using standard technologies, the protection of data in-use is still, to a large extent, an open issue. Multiple techniques enable the protection of data processing in untrusted environments, but the one which is gaining the largest consensus is unarguably Trusted Execution Environments. In this tutorial, we focus on a specific TEE technology offering, namely Intel SGX. We discuss key features of Intel SGX – including: secure enclaves, remote attestation, and sealed storage – and present different methods and tools that can be used to make data computation secure, at an acceptable cost in terms of performance penalty.

Bios

Luigi Coppolino is an Associate Professor at the University of Naples Parthenope, Italy. He is Programme Director of the degree program in Computer Engineering and Science for Cybersecurity. Since 20 years its research activity focuses on cybersecurity of critical infrastructures and more in general on fault and intrusion tolerant networked systems. Prof. Coppolino has been involved in many EU funded research program as technical coordinator or principal investigator. He is the co-founder of the TrustUp company, a spinoff of the Parthenope University proposing innovative security solutions based on Trust Execution Environments. He is responsible for the University of Naples hub of the Cyberchallenge.it training program organized by the Cybersecurity National Lab.
Giovanni Mazzeo is an Assistant Professor at the University of Naples Parthenope. His research activity mainly focuses on security and dependability of computer systems with a particular focus on the field of trusted computing. He is principal investigator and work package leader of EC-funded research projects in the field of Cloud, Critical Infrastructure, and eHealth security. He is the co-founder of the Trust Up company, a spinoff of the Parthenope University proposing innovative security solutions based on Trust Execution Environments.
Luigi Romano is a Full Professor at the University Parthenope in Italy. His research focuses on system security and dependability. He has worked extensively as a consultant for industry leaders in the field of safety critical computer systems in Europe and the US. He cooperates with ENISA (In particular the PROCENT and the Research Policy Recommendations expert groups). He has been technical coordinator of EC-funded research projects in the field of Cloud, Critical Infrastructure, and eHealth security. He is the co-founder of the Trust Up company, a spinoff of the Parthenope University proposing innovative security solutions based on Trust Execution Environments.