Skip to main content

ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes

Publication ,  Conference
Wang, W; Deng, S; Niu, J; Reiter, MK; Zhang, Y
Published in: Proceedings of the ACM Conference on Computer and Communications Security
November 7, 2022

This paper presents the first critical analysis of building highly secure, performant, and confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault-tolerant (CFT) protocols with trusted execution environments (TEEs). TEEs, like Intel SGX, are CPU extensions that offer applications a secure execution environment with strong integrity and confidentiality guarantees, by leveraging techniques like hardware-assisted isolation, memory encryption, and remote attestation. It has been speculated that when implementing a CFT protocol inside Intel SGX, one would achieve security properties similar to BFT. However, we show in this work that simply combining CFT with SGX does not directly yield a secure BFT protocol, given the wide range of attack vectors on SGX. We systematically study the fallacies in such a strawman design by performing model checking, and propose solutions to enforce safety and liveness. We also present ENGRAFT, a secure enclave-guarded Raft implementation that, firstly, achieves consensus on a cluster of 2f+1 machines tolerating up to f nodes exhibiting Byzantine-fault behavior (but well-behaved enclaves); secondly, offers a new abstraction of confidential consensus for privacy-preserving state machine replication; and finally, allows the reuse of a production-quality Raft implementation, BRaft, in the development of a highly performant BFT system.

Duke Scholars

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

November 7, 2022

Start / End Page

2841 / 2855
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wang, W., Deng, S., Niu, J., Reiter, M. K., & Zhang, Y. (2022). ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2841–2855). https://doi.org/10.1145/3548606.3560639
Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the ACM Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
Wang W, Deng S, Niu J, Reiter MK, Zhang Y. ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. In: Proceedings of the ACM Conference on Computer and Communications Security. 2022. p. 2841–55.
Wang, W., et al. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” Proceedings of the ACM Conference on Computer and Communications Security, 2022, pp. 2841–55. Scopus, doi:10.1145/3548606.3560639.
Wang W, Deng S, Niu J, Reiter MK, Zhang Y. ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. Proceedings of the ACM Conference on Computer and Communications Security. 2022. p. 2841–2855.

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

Publication Date

November 7, 2022

Start / End Page

2841 / 2855