HOME SCHEDULE REVIEWS POLICIES PROJECTS

CS 3551: Schedule and Readings

Schedule (Tentative)

Class Date Topic Readings Presenter
1. Tue 1/7 Course Introduction and Logistics
2. Thu 1/9 Distributed Systems Fundamentals and Impossibility Results ** Note: only submit discussion points, not full reviews **
CAP 12 years Later, Computer 2012
Impossibility of Distributed Consensus with One Faulty Process, JACM 1985
Amy
3. Tue 1/14 Fault-Tolerant State Machine Replication Paxos Made Simple, ACM Sigact News 2001

OPTIONAL (skim): The Part-Time Parliament, TOCS May 1998
Amy
4. Thu 1/16 Fault-Tolerant State Machine Replication Paxos Made Live - An Engineering Perspective, PODC 2007

Read, but don't review: Paxos for System Builders: An Overview, LADIS 2008
Maher
5. Tue 1/21 Distributed Key-Value Stores: Eventual Consistency Background (read first, don't review): Eventually Consistent, CACM January 2009

Dynamo: amazon's highly available key-value store, SOSP 2007

Follow-up blog posts: what happened since 2007?
DynamoDB, All Things Distributed January 2012
A Decade of Dynamo, All Things Distributed October 2017

LinkedIn's open-source version: Voldemort
Brad
6. Thu 1/23 Distributed Key-Value Stores: Causal Consistency Background (read first, don't review): A Short Primer on Causal Consistency, Usenix ;login: 2013

OPTIONAL (more detailed but still pretty easy to read background): Don't Settle for Eventual Consistency, CACM May 2014

I Can't Believe It's Not Causal! Scalable Causal Consistency with No Slowdown Cascades, NSDI 2017
Amy
7. Tue 1/28 Intrusion-Tolerant Replication Practical Byzantine Fault Tolerance, OSDI 1999 Amy
8. Thu 1/30 Intrusion-Tolerant Replication: Performance Under Attack Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults, NSDI 2009

Supplemental (Amy will briefly present for additional context): Byzantine Replication under Attack, DSN 2008
Abhishek
9. Tue 2/4 Intrusions and Industrial Control Systems Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid, DSN 2018 Mike
10. Thu 2/6 Intrusions and Industrial Control Systems ZOE: Content-Based Anomaly Detection for Industrial Control Systems, DSN 2018 Izzy
11. Tue 2/11 Blockchain and Intrusion-Tolerant Replication Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic, ICDCS 2019

Background: Bitcoin: A Peer-to-Peer Electronic Cash System
Ke-Yun
12. Thu 2/13 Blockchain and Intrusion-Tolerant Replication Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains, EuroSys 2018 Vasco
13. Tue 2/18 Project Proposals Due

Project Discussion
14. Thu 2/20 Project Discussion
15. Tue 2/25 Unikernels Unikernels: Library Operating Systems for the Cloud, ASPLOS 2013 Brad
16. Thu 2/27 Amy in DC for CRA workshop
17. Tue 3/3 Blockchain Storage The Mini-Blockchain Scheme, 2014 Nick
18. Thu 3/5 Blockchain Applications MedRec: Using Blockchain for Medical Data Access and Permission Management , Open and Big Data 2016 Ke-Yun
-- Tue 3/10 Spring break, no class
-- Thu 3/12 Spring break, no class
19. Tue 3/17 No class (online transition) Work on projects
20. Thu 3/19 No class (online transition) Work on projects
21. Tue 3/24 Project Checkpoint Presentations
22. Thu 3/26 Project Checkpoint Presentations
23. Tue 3/31 IoT Intrusion Detection Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning, Open Journal of Internet of Things 2018 Akshay
24. Thu 4/2 Distributed Load Balancing Periodic hierarchical load balancing for large supercomputers, International Journal of High Performance Computing Applications 2011 Iz
25. Tue 4/7 Environmental Monitoring Low-cost sensors and crowd-sourced data: Observations of siting impacts on a network of air-quality instruments, Science of the Total Environment 2017 Abhishek/Vasco
26. Thu 4/9 SCADA Intrusion Detection Multiattribute SCADA-Specific Intrusion Detection System for Power Networks, IEEE Transactions on Power Delivery 2014 Maher
27. Tue 4/14 Blockchain Storage Selective Blockchain Transaction Pruning and State Derivability, Crypto Valley Conference on Blockchain Technology 2018 Nick
28. Thu 4/16 IoT Intrusion Detection Detecting malicious nodes via gradient descent and support vector machine in Internet of Things, Computers and Electrical Engineering 2019 Akshay
29. Tue 4/21 Final Project Presentations
30. Thu 4/23 Final Project Presentations

Topics and Readings (under construction, subject to major revision, includes more than we'll cover)

Distributed Systems Fundamentals and Impossibility Results

Distributed Key-Value Stores

State Machine Replication and Fault-Tolerant Replication Protocols

Intrusion-Tolerant Replication

Beyond Liveness: Performance Attacks and Defenses

Blockchain in the Context of Intrusion-Tolerant Replication

Network Considerations

Network Programmability, SDN, networks as systems

Overlays, CDNs

Access Control

Practical Security

Clocks

Systems and ML

  • Ray, OSDI 2018