The CAP theorem demonstrates a trade-off between consistency and availability (and, by extension, latency) in systems where network partitions are unavoidable, such as in cloud computing and local-first software. While adopting weak consistency can preserve availability, it may result in inconsistencies that compromise application correctness. Replicated data types provide a principled, coordination-free approach to guarantee convergence but do not consider application invariants. Existing methods for maintaining invariants in replicated systems either rely on coordination–undermining the benefits of weak consistency–or suffer from limited applicability. This paper introduces the No-Op framework, a generic approach for enforcing consistency without coordination, while guaranteeing both convergence \emph{and} invariant preservation. The core idea of the No-Op approach is to resolve conflicts among concurrent operations by prioritising one operation over the other according to programmer-defined conflict resolution policies. This prioritisation transforms the less-preferred operation into a no-side-effect operation, ensuring conflict-free execution. We formalise the model underlying the No-Op framework and introduce a replication protocol built upon it, accompanied by a formal proof of correctness for both the framework and the protocol. Furthermore, we demonstrate the framework’s applicability by showcasing the design of widely used replicated data types and the preservation of a wide range of application invariants.
Tue 1 JulDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
16:15 - 17:39 | |||
16:15 21mTalk | Detecting Functionality-Specific Vulnerabilities via Retrieving Individual Functionality-Equivalent APIs in Open-Source Repositories Technical Papers Tianyu Chen Microsoft Research Asia, Zeyu Wang Huawei Cloud Computing Technologies Co., Ltd., Lin Li Huawei Cloud Computing Technologies Co., Ltd., Ding Li Peking University, Zongyang Li Peking University, Xiaoning Chang Huawei Cloud Computing Technologies Co., Ltd., Pan Bian Huawei Technologies CO., LTD., China, Guangtai Liang Huawei Cloud Computing Technologies, Qianxiang Wang Huawei Technologies Co., Ltd, Tao Xie Peking University | ||
16:36 21mTalk | Quantifying Cache Side-Channel Leakage by Refining Set-Based Abstractions Technical Papers | ||
16:57 21mTalk | Scaling Up: Revisiting Mining Android Sandboxes at Scale for Malware Classification Technical Papers Francisco Costa University of Brasília, Brazil, Ismael Medeiros Computer Science Department / University of Brasília, Leandro Oliveira Computer Science Department / University of Brasília, João Clássio Computer Science Department / University of Brasília, Rodrigo Bonifácio UNB, Krishna Narasimhan F1RE, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE, Márcio Ribeiro Federal University of Alagoas, Brazil DOI Pre-print | ||
17:18 21mTalk | Ensuring Convergence and Invariants Without Coordination Technical Papers Dina Borrego NOVA LINCS, FCT, Universidade NOVA de Lisboa, Carla Ferreira NOVA University Lisbon, Elisa Gonzalez Boix Vrije Universiteit Brussel, Nuno Preguica Universidade Nova de Lisboa |