File Download

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

박새롬

Park, Saerom
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Efficient Generation of Program Execution Hash

Author(s)
Ahn, EunyeongKim, SunjinPark, SaeromHou, Jong-UkJang, Daehee
Issued Date
2022-06
DOI
10.1109/ACCESS.2022.3181283
URI
https://scholarworks.unist.ac.kr/handle/201301/64272
Citation
IEEE ACCESS, v.10, pp.61707 - 61720
Abstract
Distributed computing systems often require verifiable computing techniques in case their node is untrusted. To verify a node's computation result, proof-of-work (PoW) is often utilized as a basis of verifiable computing method; however, this mechanism is only valid for computations producing results based on specific algorithm (e.g., AES decryption). To date, there is no efficient PoW mechanism applicable to arbitrary algorithm or a computation that does not produce any tangible output (e.g., void function). This paper proposes execution hash to serve as a proof for a program's idempotent computation result without relying on its algorithm. Two versions of execution hash generation methods were designed and implemented and the efficacy was evaluated in terms of performance and reliability. Implementation was based on LLVM/Clang 6.0 and evaluation was based on open-source software, including GNU binutils/coreutils and Google's OSSFuzz projects.
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
ISSN
2169-3536
Keyword (Author)
CodesFuzzingSoftwarePinsInstrumentsTask analysisConvergenceBinaryexecution hashproof of workprogram traceverifiable computing

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.