SlideShare a Scribd company logo
A Preliminary Study on Attacks
against Consensus in Bitcoin
@若渴 2018.4.22
<ajblane0612@gmail.com>
AjMaChInE
Consensus in Bitcoin is Broken
Outline
• Double-spending attacks [0]
• Network partition [1][2][3]
• Mining pools [4]
• Transaction malleability [6]
• Attacks targeting mining [7] [8]
• Non-trivial composition of attacks targeting
mining and network partition [8]
• …
affecting consensus
Double-Spending Attacks on Fast
Payments [0]
Network Partition Attacks
• Eclipse attack [1]
• Routing attack [2]
• …
In order to fulfill requests including victim
isolation, package delay , and so on, to stably
reach double-spending attacks.
High Level View of Bitcoin’s Peer-to-
Peer Network [1]
IP, not cryptographic
authentication
Eclipse Attack [1]
Off-Path Attack - Improving Eclipse
Attack [1]
Eclipse Implication - 51% Attack with
40% Mining Power [1]
Why to Use N- or 0-Confirmation
Transactions
Transaction security is ensured in Bitcoin by
means of blocks which instantiate a hash-based
Proof of Work (PoW) mechanism; Bitcoin’s PoW
requires 10 minutes on average to be solved and
6 consecutive blocks are recommended to
confirm any single transaction in the system.
This suggests that transactions will be confirmed
in the system after almost one hour—provided
that the majority (>50%) of the computing
power in the network is honest. [1]
Eclipse Implication – N- or 0-Confirmation
Double Spend or Engineering Block Races [1]
0% mining power
How to Implement Off-Path Attack
Routing Attacks [2]
• “Two key characteristics of the Internet’s infrastructure make
routing attacks against Bitcoin possible: (i) the efficiency of
routing manipulation (BGP hijacks); and (ii) the centralization
of Bitcoin from the routing perspective. First, individuals,
located anywhere on the Internet, can manipulate routing to
intercept all the connections to not only one, but many
Bitcoin nodes. As we show in this paper, these routing
manipulations are prevalent today and do divert Bitcoin traffic.
Second, few ASes host most of the nodes and mining power,
while others intercept a considerable fraction of the
connections.”
• “As Bitcoin connections are routed over the Internet— in clear
text and without integrity checks—any third-party on the
forwarding path can eavesdrop, drop, modify, inject, or delay
Bitcoin messages such as blocks or transactions.”
AS-level Adversary - Isolating the Set
of Nodes P = (A, B, C, D, E, F) [2]
BGP hijacking
AS-level Adversary – Delay can Keep
the Victim Eclipsed [2]
Exchange blocks
Deny the Delivery of 2 Consecutive
Blocks with 20 Minute Timeout [3]
Mining Pools
The Miner's Dilemma [4]
? ?
Transaction Malleability
Bitcoin Transaction [5]
• “A transaction is a transfer of Bitcoin value that is
broadcast to the network and collected into
blocks. A transaction typically references previous
transaction outputs as new transaction inputs
and dedicates all input Bitcoin values to new
outputs. Transactions are not encrypted, so it is
possible to browse and view every transaction
ever collected into a block. Once transactions are
buried under enough confirmations they can be
considered irreversible”
[6]
[5]
OPCODE: PUSHDATA2 [6]
Modifing Transactions by How
to Exploit a Script Feature
[6]
[6]
[6]
Modifing ScriptSing, But is Valid [6]
[6]
[6]
[6]
Transaction Failed ? [6]
Generate Another Transaction to Get
30BTC [6]
Attacks Targeting Mining
• Selfish mining [7]
• Stubborn mining [8]
Bitcoin Mining
Fairness: If Alice has 1/4th computation power, she
gets 1/4th of the total reward
1) Slide: p.2 Stubborn Mining: Generalizing
Selfish Mining and Combining with an Eclipse
Attack
2) Bitcoin always use the longest chain
The Goal of Attacks Targeting Mining
[8]
“Intuitively, for a secure-by-design
cryptocurrency, an attacker controlling fraction
of the network’s computational resource should
be able to obtain only fraction of the mining
reward. However, a malicious attacker can
employ various types of attacks to gain an unfair
share of the mining reward.”
Representation of Alice and Bob’s
Blockchain at Different Chain States [8]
Selfish Mining – Success [7][8]
In a nutshell, all known deviant mining
strategies work by selectively withholding
(Selfish) blocks mined by the attacker, causing
the rest of the network to waste its
hashpower on redundant blocks. The selfish
mining strategy, in particular, withholds
blocks when it is “in the lead” (i.e., when it
has created a private chain longer than that
of the honest network),
Selfish Mining - Fail
• But cooperates with the honest network when
it falls behind. [7][8]
Fail
Maybe
Selfish Mining [7][8]
2 reward: if Alice or the 𝛾 fraction of Bob advances
Alice’s fork, then Alice has successfully diverted a part of
Bob, (1-𝛾) fraction, to do useless work.
Stubborn Mining - Concept [8]
The key insight behind stubborn mining
strategies is that the attacker should not give up
so easily! Instead, the attacker can often
increase profits by mining on its private chain
more often(Stubborn), even under
circumstances where a selfish-mining attacker
would acquiesce to the public chain.
Stubborn
A Stubborn Mining–
Improving Selfish Mining [8]
lead = -1
Non-Trivial Composition of Attacks
Targeting Mining (e.g. selfish attack)
and Network Partition (e.g. eclipse
attack)
Strategies Exploiting
Eclipse Attack Victims
No eclipse attack
Destroy the eclipsed victim
* waste computation power
Collude with the eclipsed
victim
Destroy if No Stake (DNS)
* as conditionally colluding
with or destroying
Strategies Exploiting
Stubborn Mining
Lead stubborn mining
Equal fork stubborn
Trail stubborn mining
C(4,1) * C(3,1)
Combination
[8]
Alice Uses a Strategy with DNS and Equal Fork
Stubborn [8]
三分天下
蜀(Alice)共謀魏
蜀(Alice)共謀吳一統
mine a block
Reference
• [0] 2012, Ghassan O. Karame, etc.,Two Bitcoins at the Price of One?
Double-Spending Attacks on Fast Payments in Bitcoin
• [1] 2015, Eclipse Attacks on Bitcoin’s Peer-to-Peer Network ;
https://www.youtube.com/watch?v=J-lF0zxGpu0
• [2] 2015, Arthur Gervais, etc., Tampering with the Delivery of Blocks and
Transactions in Bitcoin
• [3] 2017, Maria Apostolaki, etc., Hijacking Bitcoin: Routing Attacks on
Cryptocurrencies; https://btc-hijack.ethz.ch/
• [4] 2014, Ittay Eyal, The Miner's Dilemma
• [5] Bircoin transaction: https://en.bitcoin.it/wiki/Transaction
• [6] 2014, black hat, Danie Chechik, etc., Bitcoin Transaction Malleability
Theory In Practice
• [7] 2014, Majority is Not Enough- Bitcoin Mining is Vulnerable (selfish
mining)
• [8] 2016, Kartik Nayk, etc. Stubborn Mining: Generalizing Selfish Mining
and Combining with an Eclipse Attack

More Related Content

Similar to [若渴] A preliminary study on attacks against consensus in bitcoin

Introduction to Attacks on Bitcoin and Cryptos
Introduction  to Attacks on  Bitcoin and CryptosIntroduction  to Attacks on  Bitcoin and Cryptos
Introduction to Attacks on Bitcoin and Cryptos
ssuser18349f1
 
Best and easy tips to mining bitcoin.
Best and easy tips to mining bitcoin.Best and easy tips to mining bitcoin.
Best and easy tips to mining bitcoin.
Qutomatic
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of Blockchain
IRJET Journal
 
Brief Introduction to Blockchain Security
Brief Introduction to Blockchain SecurityBrief Introduction to Blockchain Security
Brief Introduction to Blockchain Security
Johnson, Chuan Zhang CISM CCSK OSCP
 
Microeconomic mechanisms in Bitcoin network
Microeconomic mechanisms in Bitcoin networkMicroeconomic mechanisms in Bitcoin network
Microeconomic mechanisms in Bitcoin network
Stanislaw Baranski
 
Overview of bitcoin
Overview of bitcoinOverview of bitcoin
Overview of bitcoin
Abdul Nasir
 
Bitcoin(8-15).pptx
Bitcoin(8-15).pptxBitcoin(8-15).pptx
Bitcoin(8-15).pptx
superman12341
 
Crypto currency1
Crypto currency1Crypto currency1
Crypto currency1
Karthik Muthuchandra
 
An analysis of attacks on blockchain consensus
An analysis of attacks on blockchain consensusAn analysis of attacks on blockchain consensus
An analysis of attacks on blockchain consensus
zubairKhan200705
 
Jehyuk jang and heung no lee double spend
Jehyuk jang and heung no lee double spendJehyuk jang and heung no lee double spend
Jehyuk jang and heung no lee double spend
IT Strategy Group
 
Real Attacks on Blockchain Systems & Countermeasures
Real Attacks on Blockchain Systems & CountermeasuresReal Attacks on Blockchain Systems & Countermeasures
Real Attacks on Blockchain Systems & Countermeasures
NUS-ISS
 
[ETHCon Korea 2019] Jang jaehyuk 장재혁
[ETHCon Korea 2019] Jang jaehyuk 장재혁[ETHCon Korea 2019] Jang jaehyuk 장재혁
[ETHCon Korea 2019] Jang jaehyuk 장재혁
ethconkr
 
10 Interesting Facts About Bitcoin Mining.pdf
10 Interesting Facts About Bitcoin Mining.pdf10 Interesting Facts About Bitcoin Mining.pdf
10 Interesting Facts About Bitcoin Mining.pdf
Jhon Thompson
 
Komodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureKomodo Blockchain Security Service Brochure
Komodo Blockchain Security Service Brochure
Jean-Phi N✅
 
Blockchain & Cryptocurrencies Intro - July 2017
Blockchain & Cryptocurrencies Intro - July 2017Blockchain & Cryptocurrencies Intro - July 2017
Blockchain & Cryptocurrencies Intro - July 2017
🔗Audrey Chaing
 
IEEE ICDM 2018 Tutorial on Blockchain Data Analytics
IEEE ICDM 2018 Tutorial on Blockchain Data AnalyticsIEEE ICDM 2018 Tutorial on Blockchain Data Analytics
IEEE ICDM 2018 Tutorial on Blockchain Data Analytics
Cuneyt Gurcan Akcora
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of Blockchain
Sota Watanabe
 
Exploring The Facts about Bitcoin in Space and Efforts to Reduce Bitcoin Dust...
Exploring The Facts about Bitcoin in Space and Efforts to Reduce Bitcoin Dust...Exploring The Facts about Bitcoin in Space and Efforts to Reduce Bitcoin Dust...
Exploring The Facts about Bitcoin in Space and Efforts to Reduce Bitcoin Dust...
Crypto in California
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
codefortomorrow
 

Similar to [若渴] A preliminary study on attacks against consensus in bitcoin (20)

Introduction to Attacks on Bitcoin and Cryptos
Introduction  to Attacks on  Bitcoin and CryptosIntroduction  to Attacks on  Bitcoin and Cryptos
Introduction to Attacks on Bitcoin and Cryptos
 
Best and easy tips to mining bitcoin.
Best and easy tips to mining bitcoin.Best and easy tips to mining bitcoin.
Best and easy tips to mining bitcoin.
 
IRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of BlockchainIRJET- An Overview of the Security of Blockchain
IRJET- An Overview of the Security of Blockchain
 
Brief Introduction to Blockchain Security
Brief Introduction to Blockchain SecurityBrief Introduction to Blockchain Security
Brief Introduction to Blockchain Security
 
Microeconomic mechanisms in Bitcoin network
Microeconomic mechanisms in Bitcoin networkMicroeconomic mechanisms in Bitcoin network
Microeconomic mechanisms in Bitcoin network
 
Overview of bitcoin
Overview of bitcoinOverview of bitcoin
Overview of bitcoin
 
Bitcoin(8-15).pptx
Bitcoin(8-15).pptxBitcoin(8-15).pptx
Bitcoin(8-15).pptx
 
Crypto currency1
Crypto currency1Crypto currency1
Crypto currency1
 
An analysis of attacks on blockchain consensus
An analysis of attacks on blockchain consensusAn analysis of attacks on blockchain consensus
An analysis of attacks on blockchain consensus
 
Jehyuk jang and heung no lee double spend
Jehyuk jang and heung no lee double spendJehyuk jang and heung no lee double spend
Jehyuk jang and heung no lee double spend
 
Real Attacks on Blockchain Systems & Countermeasures
Real Attacks on Blockchain Systems & CountermeasuresReal Attacks on Blockchain Systems & Countermeasures
Real Attacks on Blockchain Systems & Countermeasures
 
[ETHCon Korea 2019] Jang jaehyuk 장재혁
[ETHCon Korea 2019] Jang jaehyuk 장재혁[ETHCon Korea 2019] Jang jaehyuk 장재혁
[ETHCon Korea 2019] Jang jaehyuk 장재혁
 
10 Interesting Facts About Bitcoin Mining.pdf
10 Interesting Facts About Bitcoin Mining.pdf10 Interesting Facts About Bitcoin Mining.pdf
10 Interesting Facts About Bitcoin Mining.pdf
 
Blockene
BlockeneBlockene
Blockene
 
Komodo Blockchain Security Service Brochure
Komodo Blockchain Security Service BrochureKomodo Blockchain Security Service Brochure
Komodo Blockchain Security Service Brochure
 
Blockchain & Cryptocurrencies Intro - July 2017
Blockchain & Cryptocurrencies Intro - July 2017Blockchain & Cryptocurrencies Intro - July 2017
Blockchain & Cryptocurrencies Intro - July 2017
 
IEEE ICDM 2018 Tutorial on Blockchain Data Analytics
IEEE ICDM 2018 Tutorial on Blockchain Data AnalyticsIEEE ICDM 2018 Tutorial on Blockchain Data Analytics
IEEE ICDM 2018 Tutorial on Blockchain Data Analytics
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of Blockchain
 
Exploring The Facts about Bitcoin in Space and Efforts to Reduce Bitcoin Dust...
Exploring The Facts about Bitcoin in Space and Efforts to Reduce Bitcoin Dust...Exploring The Facts about Bitcoin in Space and Efforts to Reduce Bitcoin Dust...
Exploring The Facts about Bitcoin in Space and Efforts to Reduce Bitcoin Dust...
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 

More from Aj MaChInE

An Intro on Data-oriented Attacks
An Intro on Data-oriented AttacksAn Intro on Data-oriented Attacks
An Intro on Data-oriented Attacks
Aj MaChInE
 
A Study on .NET Framework for Red Team - Part I
A Study on .NET Framework for Red Team - Part IA Study on .NET Framework for Red Team - Part I
A Study on .NET Framework for Red Team - Part I
Aj MaChInE
 
A study on NetSpectre
A study on NetSpectreA study on NetSpectre
A study on NetSpectre
Aj MaChInE
 
Introduction to Adversary Evaluation Tools
Introduction to Adversary Evaluation ToolsIntroduction to Adversary Evaluation Tools
Introduction to Adversary Evaluation Tools
Aj MaChInE
 
[RAT資安小聚] Study on Automatically Evading Malware Detection
[RAT資安小聚] Study on Automatically Evading Malware Detection[RAT資安小聚] Study on Automatically Evading Malware Detection
[RAT資安小聚] Study on Automatically Evading Malware Detection
Aj MaChInE
 
[若渴] Preliminary Study on Design and Exploitation of Trustzone
[若渴] Preliminary Study on Design and Exploitation of Trustzone[若渴] Preliminary Study on Design and Exploitation of Trustzone
[若渴] Preliminary Study on Design and Exploitation of Trustzone
Aj MaChInE
 
[若渴]Study on Side Channel Attacks and Countermeasures
[若渴]Study on Side Channel Attacks and Countermeasures [若渴]Study on Side Channel Attacks and Countermeasures
[若渴]Study on Side Channel Attacks and Countermeasures
Aj MaChInE
 
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
Aj MaChInE
 
[若渴計畫] Introduction: Formal Verification for Code
[若渴計畫] Introduction: Formal Verification for Code[若渴計畫] Introduction: Formal Verification for Code
[若渴計畫] Introduction: Formal Verification for Code
Aj MaChInE
 
[若渴計畫] Studying ASLR^cache
[若渴計畫] Studying ASLR^cache[若渴計畫] Studying ASLR^cache
[若渴計畫] Studying ASLR^cache
Aj MaChInE
 
[若渴計畫] Black Hat 2017之過去閱讀相關整理
[若渴計畫] Black Hat 2017之過去閱讀相關整理[若渴計畫] Black Hat 2017之過去閱讀相關整理
[若渴計畫] Black Hat 2017之過去閱讀相關整理
Aj MaChInE
 
[若渴計畫] Studying Concurrency
[若渴計畫] Studying Concurrency[若渴計畫] Studying Concurrency
[若渴計畫] Studying Concurrency
Aj MaChInE
 
閱讀文章分享@若渴 2016.1.24
閱讀文章分享@若渴 2016.1.24閱讀文章分享@若渴 2016.1.24
閱讀文章分享@若渴 2016.1.24
Aj MaChInE
 
[若渴計畫2015.8.18] SMACK
[若渴計畫2015.8.18] SMACK[若渴計畫2015.8.18] SMACK
[若渴計畫2015.8.18] SMACK
Aj MaChInE
 
[SITCON2015] 自己的異質多核心平台自己幹
[SITCON2015] 自己的異質多核心平台自己幹[SITCON2015] 自己的異質多核心平台自己幹
[SITCON2015] 自己的異質多核心平台自己幹
Aj MaChInE
 
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
Aj MaChInE
 
[若渴計畫]由GPU硬體概念到coding CUDA
[若渴計畫]由GPU硬體概念到coding CUDA[若渴計畫]由GPU硬體概念到coding CUDA
[若渴計畫]由GPU硬體概念到coding CUDA
Aj MaChInE
 
[若渴計畫]64-bit Linux Return-Oriented Programming
[若渴計畫]64-bit Linux Return-Oriented Programming[若渴計畫]64-bit Linux Return-Oriented Programming
[若渴計畫]64-bit Linux Return-Oriented Programming
Aj MaChInE
 
[MOSUT] Format String Attacks
[MOSUT] Format String Attacks[MOSUT] Format String Attacks
[MOSUT] Format String Attacks
Aj MaChInE
 

More from Aj MaChInE (19)

An Intro on Data-oriented Attacks
An Intro on Data-oriented AttacksAn Intro on Data-oriented Attacks
An Intro on Data-oriented Attacks
 
A Study on .NET Framework for Red Team - Part I
A Study on .NET Framework for Red Team - Part IA Study on .NET Framework for Red Team - Part I
A Study on .NET Framework for Red Team - Part I
 
A study on NetSpectre
A study on NetSpectreA study on NetSpectre
A study on NetSpectre
 
Introduction to Adversary Evaluation Tools
Introduction to Adversary Evaluation ToolsIntroduction to Adversary Evaluation Tools
Introduction to Adversary Evaluation Tools
 
[RAT資安小聚] Study on Automatically Evading Malware Detection
[RAT資安小聚] Study on Automatically Evading Malware Detection[RAT資安小聚] Study on Automatically Evading Malware Detection
[RAT資安小聚] Study on Automatically Evading Malware Detection
 
[若渴] Preliminary Study on Design and Exploitation of Trustzone
[若渴] Preliminary Study on Design and Exploitation of Trustzone[若渴] Preliminary Study on Design and Exploitation of Trustzone
[若渴] Preliminary Study on Design and Exploitation of Trustzone
 
[若渴]Study on Side Channel Attacks and Countermeasures
[若渴]Study on Side Channel Attacks and Countermeasures [若渴]Study on Side Channel Attacks and Countermeasures
[若渴]Study on Side Channel Attacks and Countermeasures
 
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
 
[若渴計畫] Introduction: Formal Verification for Code
[若渴計畫] Introduction: Formal Verification for Code[若渴計畫] Introduction: Formal Verification for Code
[若渴計畫] Introduction: Formal Verification for Code
 
[若渴計畫] Studying ASLR^cache
[若渴計畫] Studying ASLR^cache[若渴計畫] Studying ASLR^cache
[若渴計畫] Studying ASLR^cache
 
[若渴計畫] Black Hat 2017之過去閱讀相關整理
[若渴計畫] Black Hat 2017之過去閱讀相關整理[若渴計畫] Black Hat 2017之過去閱讀相關整理
[若渴計畫] Black Hat 2017之過去閱讀相關整理
 
[若渴計畫] Studying Concurrency
[若渴計畫] Studying Concurrency[若渴計畫] Studying Concurrency
[若渴計畫] Studying Concurrency
 
閱讀文章分享@若渴 2016.1.24
閱讀文章分享@若渴 2016.1.24閱讀文章分享@若渴 2016.1.24
閱讀文章分享@若渴 2016.1.24
 
[若渴計畫2015.8.18] SMACK
[若渴計畫2015.8.18] SMACK[若渴計畫2015.8.18] SMACK
[若渴計畫2015.8.18] SMACK
 
[SITCON2015] 自己的異質多核心平台自己幹
[SITCON2015] 自己的異質多核心平台自己幹[SITCON2015] 自己的異質多核心平台自己幹
[SITCON2015] 自己的異質多核心平台自己幹
 
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
 
[若渴計畫]由GPU硬體概念到coding CUDA
[若渴計畫]由GPU硬體概念到coding CUDA[若渴計畫]由GPU硬體概念到coding CUDA
[若渴計畫]由GPU硬體概念到coding CUDA
 
[若渴計畫]64-bit Linux Return-Oriented Programming
[若渴計畫]64-bit Linux Return-Oriented Programming[若渴計畫]64-bit Linux Return-Oriented Programming
[若渴計畫]64-bit Linux Return-Oriented Programming
 
[MOSUT] Format String Attacks
[MOSUT] Format String Attacks[MOSUT] Format String Attacks
[MOSUT] Format String Attacks
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 

[若渴] A preliminary study on attacks against consensus in bitcoin

  • 1. A Preliminary Study on Attacks against Consensus in Bitcoin @若渴 2018.4.22 <ajblane0612@gmail.com> AjMaChInE
  • 3. Outline • Double-spending attacks [0] • Network partition [1][2][3] • Mining pools [4] • Transaction malleability [6] • Attacks targeting mining [7] [8] • Non-trivial composition of attacks targeting mining and network partition [8] • … affecting consensus
  • 4. Double-Spending Attacks on Fast Payments [0]
  • 5. Network Partition Attacks • Eclipse attack [1] • Routing attack [2] • … In order to fulfill requests including victim isolation, package delay , and so on, to stably reach double-spending attacks.
  • 6. High Level View of Bitcoin’s Peer-to- Peer Network [1] IP, not cryptographic authentication
  • 8. Off-Path Attack - Improving Eclipse Attack [1]
  • 9. Eclipse Implication - 51% Attack with 40% Mining Power [1]
  • 10. Why to Use N- or 0-Confirmation Transactions Transaction security is ensured in Bitcoin by means of blocks which instantiate a hash-based Proof of Work (PoW) mechanism; Bitcoin’s PoW requires 10 minutes on average to be solved and 6 consecutive blocks are recommended to confirm any single transaction in the system. This suggests that transactions will be confirmed in the system after almost one hour—provided that the majority (>50%) of the computing power in the network is honest. [1]
  • 11. Eclipse Implication – N- or 0-Confirmation Double Spend or Engineering Block Races [1] 0% mining power
  • 12. How to Implement Off-Path Attack
  • 13. Routing Attacks [2] • “Two key characteristics of the Internet’s infrastructure make routing attacks against Bitcoin possible: (i) the efficiency of routing manipulation (BGP hijacks); and (ii) the centralization of Bitcoin from the routing perspective. First, individuals, located anywhere on the Internet, can manipulate routing to intercept all the connections to not only one, but many Bitcoin nodes. As we show in this paper, these routing manipulations are prevalent today and do divert Bitcoin traffic. Second, few ASes host most of the nodes and mining power, while others intercept a considerable fraction of the connections.” • “As Bitcoin connections are routed over the Internet— in clear text and without integrity checks—any third-party on the forwarding path can eavesdrop, drop, modify, inject, or delay Bitcoin messages such as blocks or transactions.”
  • 14. AS-level Adversary - Isolating the Set of Nodes P = (A, B, C, D, E, F) [2] BGP hijacking
  • 15. AS-level Adversary – Delay can Keep the Victim Eclipsed [2] Exchange blocks
  • 16. Deny the Delivery of 2 Consecutive Blocks with 20 Minute Timeout [3]
  • 20. Bitcoin Transaction [5] • “A transaction is a transfer of Bitcoin value that is broadcast to the network and collected into blocks. A transaction typically references previous transaction outputs as new transaction inputs and dedicates all input Bitcoin values to new outputs. Transactions are not encrypted, so it is possible to browse and view every transaction ever collected into a block. Once transactions are buried under enough confirmations they can be considered irreversible”
  • 21. [6]
  • 22. [5]
  • 24. Modifing Transactions by How to Exploit a Script Feature
  • 25. [6]
  • 26. [6]
  • 27. [6]
  • 28. Modifing ScriptSing, But is Valid [6]
  • 29. [6]
  • 30. [6]
  • 31. [6]
  • 33. Generate Another Transaction to Get 30BTC [6]
  • 34. Attacks Targeting Mining • Selfish mining [7] • Stubborn mining [8]
  • 35. Bitcoin Mining Fairness: If Alice has 1/4th computation power, she gets 1/4th of the total reward 1) Slide: p.2 Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack 2) Bitcoin always use the longest chain
  • 36. The Goal of Attacks Targeting Mining [8] “Intuitively, for a secure-by-design cryptocurrency, an attacker controlling fraction of the network’s computational resource should be able to obtain only fraction of the mining reward. However, a malicious attacker can employ various types of attacks to gain an unfair share of the mining reward.”
  • 37. Representation of Alice and Bob’s Blockchain at Different Chain States [8]
  • 38. Selfish Mining – Success [7][8] In a nutshell, all known deviant mining strategies work by selectively withholding (Selfish) blocks mined by the attacker, causing the rest of the network to waste its hashpower on redundant blocks. The selfish mining strategy, in particular, withholds blocks when it is “in the lead” (i.e., when it has created a private chain longer than that of the honest network),
  • 39. Selfish Mining - Fail • But cooperates with the honest network when it falls behind. [7][8] Fail Maybe
  • 40. Selfish Mining [7][8] 2 reward: if Alice or the 𝛾 fraction of Bob advances Alice’s fork, then Alice has successfully diverted a part of Bob, (1-𝛾) fraction, to do useless work.
  • 41. Stubborn Mining - Concept [8] The key insight behind stubborn mining strategies is that the attacker should not give up so easily! Instead, the attacker can often increase profits by mining on its private chain more often(Stubborn), even under circumstances where a selfish-mining attacker would acquiesce to the public chain. Stubborn
  • 42. A Stubborn Mining– Improving Selfish Mining [8] lead = -1
  • 43. Non-Trivial Composition of Attacks Targeting Mining (e.g. selfish attack) and Network Partition (e.g. eclipse attack)
  • 44. Strategies Exploiting Eclipse Attack Victims No eclipse attack Destroy the eclipsed victim * waste computation power Collude with the eclipsed victim Destroy if No Stake (DNS) * as conditionally colluding with or destroying Strategies Exploiting Stubborn Mining Lead stubborn mining Equal fork stubborn Trail stubborn mining C(4,1) * C(3,1) Combination [8]
  • 45. Alice Uses a Strategy with DNS and Equal Fork Stubborn [8] 三分天下 蜀(Alice)共謀魏 蜀(Alice)共謀吳一統 mine a block
  • 46. Reference • [0] 2012, Ghassan O. Karame, etc.,Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin • [1] 2015, Eclipse Attacks on Bitcoin’s Peer-to-Peer Network ; https://www.youtube.com/watch?v=J-lF0zxGpu0 • [2] 2015, Arthur Gervais, etc., Tampering with the Delivery of Blocks and Transactions in Bitcoin • [3] 2017, Maria Apostolaki, etc., Hijacking Bitcoin: Routing Attacks on Cryptocurrencies; https://btc-hijack.ethz.ch/ • [4] 2014, Ittay Eyal, The Miner's Dilemma • [5] Bircoin transaction: https://en.bitcoin.it/wiki/Transaction • [6] 2014, black hat, Danie Chechik, etc., Bitcoin Transaction Malleability Theory In Practice • [7] 2014, Majority is Not Enough- Bitcoin Mining is Vulnerable (selfish mining) • [8] 2016, Kartik Nayk, etc. Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack