Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications

نویسندگان

  • Andrew Miller
  • Rob Jansen
چکیده

We describe a new methodology that enables the direct execution of multi-threaded applications inside of Shadow, an existing parallel discrete-event network simulation framework. Our methodology utilizes function interposition and an application-layer thread library to emulate the ordinary thread interface to the application. Using this methodology, we implement a new Shadow plug-in that directly executes the Bitcoin reference client software. To demonstrate the usefulness of this tool, we present novel denial-of-service attacks against the Bitcoin software that exploit low-level implementation artifacts in the Bitcoin reference client; our deterministic simulator was helpful in developing and demonstrating these attacks. We describe optimizations that enable scalable execution of thousands of Bitcoin nodes on a single machine, and discuss how to model the Bitcoin network for experimental purposes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Multi-threaded Execution Model for the Agent-Based SEMSim Traffic Simulation

An efficient simulation execution engine is crucial for agentbased traffic simulation. Depending on the size of the simulation scenario the execution engine would have to update several thousand agents during a single time step. This update may also include route calculations which are computationally expensive. The ability to dynamically re-calculate the route of agents is a feature often not ...

متن کامل

Cooling the Hot Sets: Improved Space Utilization in Large Caches via Dynamic Set Balancing

Multi-megabyte on-chip last-level caches are commonplace in high-end computing platforms. Even though these caches are often designed to have very high associativity, they suffer from non-uniform utilization of the sets leading to a high volume of conflict misses. Clustering of physical addresses to a few hot sets happens partly due to poor locality in the access stream and partly due to a mism...

متن کامل

A Scalable Concurrent malloc(3) Implementation for FreeBSD

The FreeBSD project has been engaged in ongoing work to provide scalable support for multi-processor computer systems since version 5. Sufficient progress has been made that the C library’s malloc(3) memory allocator is now a potential bottleneck for multi-threaded applications running on multiprocessor systems. In this paper, I present a new memory allocator that builds on the state of the art...

متن کامل

Parallelization Techniques with Improved Dependence Handling

Continuing exponential growth in transistor density and diminishing returns from the increasing transistor count have forced processor manufacturers to pack multiple processor cores onto a single chip. These processors, known as multi-core processors, generally do not improve the performance of single-threaded applications. Automatic parallelization has a key role to play in improving the perfo...

متن کامل

Energy Modelling of Software for a Hardware Multi-threaded Embedded Microprocessor

This paper examines a hardware multi-threaded microprocessor and discusses the impact such an architecture has on existing software energy modelling techniques. A framework is constructed for analysing the energy behaviour of the XMOS XS1-L multi-threaded processor and a variation on existing software energy models is proposed, based on analysis of collected energy data. It is shown that by com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015