James Hendricks
Carnegie Mellon University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by James Hendricks.
symposium on operating systems principles | 2007
James Hendricks; Gregory R. Ganger; Michael K. Reiter
This paper presents an erasure-coded Byzantine fault-tolerant block storage protocol that is nearly as efficient as protocols that tolerate only crashes. Previous Byzantine fault-tolerant block storage protocols have either relied upon replication, which is inefficient for large blocks of data when tolerating multiple faults, or a combination of additional servers, extra computation, and versioned storage. To avoid these expensive techniques, our protocol employs novel mechanisms to optimize for the common case when faults and concurrency are rare. In the common case, a write operation completes in two rounds of communication and a read completes in one round. The protocol requires a short checksum comprised of cryptographic hashes and homomorphic fingerprints. It achieves throughput within 10% of the crash-tolerant protocol for writes and reads in failure-free runs when configured to tolerate up to 6 faulty servers and any number of faulty clients.
principles of distributed computing | 2007
James Hendricks; Gregory R. Ganger; Michael K. Reiter
Erasure coding can reduce the space and band width overheads of redundancy in fault-tolerant data storage and delivery systems. But it introduces the fundamental difficulty of ensuring that all erasure-coded fragments correspond to the same block of data. Without such assurance, a different block may be reconstructed from different subsets of fragments. This paper develops a technique for providing this assurance without the bandwidth and computational overheads associated with current approaches. The core idea is to distribute with each fragment what we call homomorphic fingerprints. These fingerprints preserve the structure of the erasure code and allow each fragment to be independently verified as corresponding to a specific block. We demonstrate homomorphic fingerprinting functions that are secure, efficient, and compact.
acm sigops european workshop | 2004
James Hendricks; Leendert van Doorn
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware of all devices in the computer, not just devices that are accessible by the host CPU. Modern computers contain many autonomous processing elements, such as disk controllers, disks, network adapters, and coprocessors, that all have field-upgradeable firmware and are an essential component of the computer systems trust model. Ignoring these devices opens the system to attacks similar to those secure boot was engineered to defeat.
dependable systems and networks | 2010
James Hendricks; Shafeeq Sinnamohideen; Gregory R. Ganger; Michael K. Reiter
Zzyzx is a Byzantine fault-tolerant replicated state machine protocol that outperforms prior approaches and provides near-linear throughput scaling. Using a new technique called Byzantine Locking, Zzyzx allows a client to extract state from an underlying replicated state machine and access it via a second protocol specialized for use by a single client. This second protocol requires just one round-trip and 2 f + 1 responsive servers—compared to Zyzzyva, this results in 39–43% lower response times and a factor of 2.2−2.9× higher throughput. Furthermore, the extracted state can be transferred to other servers, allowing non-overlapping sets of servers to manage different state. Thus, Zzyzx allows throughput to be scaled by adding servers when concurrent data sharing is not common. When data sharing is common, performance can match that of the underlying replicated state machine protocol.
file and storage technologies | 2005
Michael Abd-El-Malek; William V. Courtright Ii; Charles D. Cranor; Gregory R. Ganger; James Hendricks; Andrew J. Klosterman; Michael P. Mesnier; Manish Prasad; Brandon Salmon; Raja R. Sambasivan; Shafeeq Sinnamohideen; John D. Strunk; Eno Thereska; Matthew Wachs; Jay J. Wylie
file and storage technologies | 2007
Michael P. Mesnier; Matthew Wachs; Raja R. Sambasivan; Julio Lopez; James Hendricks; Gregory R. Ganger; David R. O'Hallaron
Archive | 2006
James Hendricks; Raja R. Sambasivan; Shafeeq Sinnamohideen; Gregory R. Ganger
usenix annual technical conference | 2010
Shafeeq Sinnamohideen; Raja R. Sambasivan; James Hendricks; Likun Liu; Gregory R. Ganger
ALS'00 Proceedings of the 4th annual Linux Showcase & Conference - Volume 4 | 2000
Ronald Minnich; James Hendricks; Dale Webster
IEEE Data(base) Engineering Bulletin | 2006
Michael Abd-El-Malek; William V. Courtright Ii; Charles D. Cranor; Gregory R. Ganger; James Hendricks; Andrew J. Klosterman; Michael P. Mesnier; Manish Prasad; Brandon Salmon; Raja R. Sambasivan; Shafeeq Sinnamohideen; John D. Strunk; Eno Thereska; Matthew Wachs; Jay J. Wylie