The Efficient Server Audit Problem, Deduplicated Re-execution, and the Web

Posted on November 7, 2017

Authors: Joshua Leners (Two Sigma), Cheng Tan, Lingfan Yu, Michael Walfish

Published in: Proceedings of the 26th Symposium on Operating Systems Principles, SOSP’17, Pages 546-564

Abstract: You put a program on a concurrent server, but you don’t trust the server; later, you get a trace of the actual requests that the server received from its clients and the responses that it delivered. You separately get logs from the server; these are untrusted. How can you use the logs to efficiently verify that the responses were derived from running the program on the requests? This is the Efficient Server Audit Problem, which abstracts real-world scenarios, including running a web application on an untrusted provider. We give a solution based on several new techniques, including simultaneous replay and efficient verification of concurrent executions. We implement the solution for PHP web applications. For several applications, our verifier achieves 5.6-10.9x speedup versus simply re-executing, with <10% overhead for the server.

DOIhttps://doi.org/10.1145/3132747.3132760

Download PDF — 789.76 KB
References

This is the author’s version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in the Proceedings of the 26th Symposium on Operating Systems Principles. https://doi.org/10.1145/3132747.3132760

The views expressed above are not necessarily the views of Two Sigma Investments, LP or any of its affiliates (collectively, “Two Sigma”).  The information presented above is only for informational and educational purposes and is not an offer to sell or the solicitation of an offer to buy any securities or other instruments. Additionally, the above information is not intended to provide, and should not be relied upon for investment, accounting, legal or tax advice. Two Sigma makes no representations, express or implied, regarding the accuracy or completeness of this information, and the reader accepts all risks in relying on the above information for any purpose whatsoever. Click here for other important disclaimers and disclosures.

Related Articles