Class | Date | Topic | Readings | Presenter |
1. | Tue 1/7 | Course Introduction and Logistics | ||
2. | Thu 1/9 | Distributed Systems Fundamentals and Impossibility Results |
** Note: only submit discussion points, not full reviews ** CAP 12 years Later, Computer 2012 Impossibility of Distributed Consensus with One Faulty Process, JACM 1985 |
Amy |
3. | Tue 1/14 | Fault-Tolerant State Machine Replication |
Paxos Made Simple, ACM Sigact News 2001 OPTIONAL (skim): The Part-Time Parliament, TOCS May 1998 |
Amy |
4. | Thu 1/16 | Fault-Tolerant State Machine Replication |
Paxos Made Live - An Engineering Perspective, PODC 2007 Read, but don't review: Paxos for System Builders: An Overview, LADIS 2008 |
Maher |
5. | Tue 1/21 | Distributed Key-Value Stores: Eventual Consistency |
Background (read first, don't review): Eventually Consistent, CACM January 2009 Dynamo: amazon's highly available key-value store, SOSP 2007 Follow-up blog posts: what happened since 2007? DynamoDB, All Things Distributed January 2012 A Decade of Dynamo, All Things Distributed October 2017 LinkedIn's open-source version: Voldemort |
Brad |
6. | Thu 1/23 | Distributed Key-Value Stores: Causal Consistency |
Background (read first, don't review): A Short Primer on Causal Consistency, Usenix ;login: 2013 OPTIONAL (more detailed but still pretty easy to read background): Don't Settle for Eventual Consistency, CACM May 2014 I Can't Believe It's Not Causal! Scalable Causal Consistency with No Slowdown Cascades, NSDI 2017 |
Amy |
7. | Tue 1/28 | Intrusion-Tolerant Replication | Practical Byzantine Fault Tolerance, OSDI 1999 | Amy |
8. | Thu 1/30 | Intrusion-Tolerant Replication: Performance Under Attack |
Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults, NSDI 2009 Supplemental (Amy will briefly present for additional context): Byzantine Replication under Attack, DSN 2008 |
Abhishek |
9. | Tue 2/4 | Intrusions and Industrial Control Systems | Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid, DSN 2018 | Mike |
10. | Thu 2/6 | Intrusions and Industrial Control Systems | ZOE: Content-Based Anomaly Detection for Industrial Control Systems, DSN 2018 | Izzy |
11. | Tue 2/11 | Blockchain and Intrusion-Tolerant Replication |
Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic, ICDCS 2019 Background: Bitcoin: A Peer-to-Peer Electronic Cash System |
Ke-Yun |
12. | Thu 2/13 | Blockchain and Intrusion-Tolerant Replication | Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains, EuroSys 2018 | Vasco |
13. | Tue 2/18 | Project Proposals Due |
Project Discussion | |
14. | Thu 2/20 | Project Discussion | ||
15. | Tue 2/25 | Unikernels | Unikernels: Library Operating Systems for the Cloud, ASPLOS 2013 | Brad |
16. | Thu 2/27 | Amy in DC for CRA workshop | ||
17. | Tue 3/3 | Blockchain Storage | The Mini-Blockchain Scheme, 2014 | Nick |
18. | Thu 3/5 | Blockchain Applications | MedRec: Using Blockchain for Medical Data Access and Permission Management , Open and Big Data 2016 | Ke-Yun |
-- | Tue 3/10 | Spring break, no class | ||
-- | Thu 3/12 | Spring break, no class | ||
19. | Tue 3/17 | No class (online transition) | Work on projects | |
20. | Thu 3/19 | No class (online transition) | Work on projects | |
21. | Tue 3/24 | Project Checkpoint Presentations | ||
22. | Thu 3/26 | Project Checkpoint Presentations | ||
23. | Tue 3/31 | IoT Intrusion Detection | Identifying Malicious Nodes in Multihop IoT Networks using Dual Link Technologies and Unsupervised Learning, Open Journal of Internet of Things 2018 | Akshay |
24. | Thu 4/2 | Distributed Load Balancing | Periodic hierarchical load balancing for large supercomputers, International Journal of High Performance Computing Applications 2011 | Iz |
25. | Tue 4/7 | Environmental Monitoring | Low-cost sensors and crowd-sourced data: Observations of siting impacts on a network of air-quality instruments, Science of the Total Environment 2017 | Abhishek/Vasco |
26. | Thu 4/9 | SCADA Intrusion Detection | Multiattribute SCADA-Specific Intrusion Detection System for Power Networks, IEEE Transactions on Power Delivery 2014 | Maher |
27. | Tue 4/14 | Blockchain Storage | Selective Blockchain Transaction Pruning and State Derivability, Crypto Valley Conference on Blockchain Technology 2018 | Nick |
28. | Thu 4/16 | IoT Intrusion Detection | Detecting malicious nodes via gradient descent and support vector machine in Internet of Things, Computers and Electrical Engineering 2019 | Akshay |
29. | Tue 4/21 | Final Project Presentations | ||
30. | Thu 4/23 | Final Project Presentations |
Distributed Systems Fundamentals and Impossibility Results
Distributed Key-Value Stores
State Machine Replication and Fault-Tolerant Replication Protocols
Intrusion-Tolerant Replication
Beyond Liveness: Performance Attacks and Defenses
Blockchain in the Context of Intrusion-Tolerant Replication
Network Considerations
Network Programmability, SDN, networks as systems
Overlays, CDNs
Access Control
Practical Security
Clocks
Systems and ML