A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Computation Integrity Assurance for Emerging Distributed Computation Outsourcing Environments, The Case of Block Withholding Attack on Bitcoin Pools
2020
IET Information Security
Then, they discuss the 'Block Withholding' attack in cryptocurrency mining pools as a case study. ...
Recently emerged distributed computation outsourcing environments (e.g. volunteer computing, crowdsourcing, cloud computing, and pooled mining in cryptocurrencies) provide many new opportunities and challenges ...
Game theoretic analysis of the mitigation methods The first two proposed mitigation methods increase the time of running a profitable BW attack because any block withholder miner should submit at least ...
doi:10.1049/iet-ifs.2018.5496
fatcat:epwspvubibh2nn4hcwswrqqwcu
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive
[article]
2022
arXiv
pre-print
One of them is a Block WithHolding (BWH) attack that can exploit a widespread and cooperative environment called a mining pool. ...
This attack takes advantage of untrustworthy relationships between mining pools and participating agents. ...
Detection and Mitigation of Block Double-Submission Attacks Multiple detections and evasion measures have been proposed against a BWH attack exploited by BDS attacks, including probabilistic detection, ...
arXiv:2208.05425v2
fatcat:g6f7jkprkfehdajclqb4ezamzq
Dependability Analysis of Bitcoin subject to Eclipse Attacks
2021
International journal of mathematical, engineering and management sciences
a new challenge: the dependability modeling and analysis of the blockchain-based systems. ...
We analyze the dependability of the Bitcoin system subject to the Eclipse attack. ...
The authors would like to thank the editor and anonymous reviewers for their comments that help improve the quality of this work. ...
doi:10.33889/ijmems.2021.6.2.028
fatcat:jfjseg3bgrecnfc57dovyiykri
Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation
2021
International journal of mathematical, engineering and management sciences
This paper models and analyzes the dependability of Bitcoin nodes subject to Eclipse attacks and state-dependent mitigation activities. ...
A semi-Markov process (SMP) based approach is proposed to model the Eclipse attack behavior and possible mitigation activities that may prevent the attack from being successful during the attack process ...
The authors would like to thank the editor and anonymous reviewers for their comments that help improve the quality of this work. ...
doi:10.33889/ijmems.2021.6.2.029
fatcat:hzspneiptvai7jhlvamiprwc4y
Contra-*: Mechanisms for Countering Spam Attacks on Blockchain's Memory Pools
[article]
2021
arXiv
pre-print
We study this attack on Bitcoin mempool and explore the attack effects on transactions fee paid by benign users. ...
Blockchain-based cryptocurrencies, such as Bitcoin, have seen on the rise in their popularity and value, making them a target to several forms of Denial-of-Service (DoS) attacks, and calling for a better ...
block withholding,
mempool. ...
arXiv:2005.04842v2
fatcat:e545mjnvjbcghf35ycbwbxoyqa
Exploring the Attack Surface of Blockchain: A Systematic Overview
[article]
2019
arXiv
pre-print
(due to selfish behavior or distributed denial-of-service attacks), Blockchain forks, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks. ...
A secondary contribution of this work is outlining effective defense measures taken by the Blockchain technology or proposed by researchers to mitigate the effects of these attacks and patch associated ...
Classical block withholding attack: The block withholding attack is launched against decentralized mining pools with intent to harm the pool operator by withholding a valid PoW ...
arXiv:1904.03487v1
fatcat:bo67ns67enh3dpzzlmkbtbgx6i
Share Withholding Attack in Blockchain Mining: Technical Report
[article]
2020
arXiv
pre-print
Prior research in blockchain security identified financially incentivized attacks based on withholding blocks which have the attacker compromise a victim pool and pose as a PoW contributor by submitting ...
We advance such threats to generate greater reward advantage to the attackers while undermining the other miners and introduce the share withholding attack (SWH). ...
These attacks are in the forms of block-withholding attack (BWH), fork-after-withholding (FAW), and uncle-block attack (UBA). ...
arXiv:2008.13317v1
fatcat:s6e6ve5uorfczlhhbosjsaf6h4
Congestion Attacks in Payment Channel Networks
[article]
2021
arXiv
pre-print
We consider three main versions of the attack: one in which the attacker attempts to block as many high liquidity channels as possible, one in which it disconnects as many pairs of nodes as it can, and ...
Finally, we suggest mitigation techniques that make these attacks much harder to carry out. ...
Acknowledgments We thank Itay Cohen, Nir Lavee and Zvi Yishai for providing improvements in our network partitioning algorithms and analysis. ...
arXiv:2002.06564v4
fatcat:pueqv4u3rbatbccgqp3mahrrny
Time-Dilation Attacks on the Lightning Network
[article]
2020
arXiv
pre-print
The attacks require dilating the time for victims to become aware of new blocks by eclipsing (isolating) victims from the network and delaying block delivery. ...
Lightning Network (LN) is a widely-used network of payment channels enabling faster and cheaper Bitcoin transactions. ...
ACKNOWLEDGMENTS We are grateful to Suhas Daftuar and Matt Corallo for initial discussions on time-dilation attacks. ...
arXiv:2006.01418v1
fatcat:biec6xlpwbeildzlng4n76so44
Temporary Block Withholding Attacks on Filecoin's Expected Consensus
2023
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
In this paper, we propose three temporary block withholding attacks to challenge Filecoin's expected consensus (EC). ...
withholding attacks without a loss in revenue, which could affect Filecoin's security and performance. ...
We provide countermeasures to mitigate temporary block withholding attacks as follows. 8.3.1 Synchronizing Filecoin network and drand nework. ...
doi:10.1145/3607199.3607213
fatcat:eyntkvvbxjb6vfhag644y34xem
The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks
2020
Journal of Internet Services and Information Security
In this article, we describe 24 risks, which we structured into the four domains "Blockchain Structure Vulnerabilities", "Attacks on the Consensus Mechanism", "Application Oriented Attacks" and "Attacks ...
Stale and Orphaned Blocks Stale and Orphan Blocks are validated blocks that end up outside of the main blockchain. ...
Fork After Withholding Attack The fork after withholding attack (FAW) is similar to the first option of classical block withholding attacks. ...
doi:10.22667/jisis.2020.08.31.110
dblp:journals/jisis/KonigUKT20
fatcat:n4qdpe54fbcibdcwfodgicgxyy
Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions
[article]
2021
arXiv
pre-print
In this attack, the adversary misuses the Bitcoin protocol to bribe miners and maximize their gained advantage. ...
In this paper, we design a novel bribery attack and show that this guarantee can be hugely undermined. ...
Block withholding attack was initially proposed by Rosenfeld in 2011. There are two types of block withholding attack [26] . ...
arXiv:2105.07501v1
fatcat:gpvwtuotwzf53hzyabs5s3oh7y
Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach
2020
IEEE Access
Specifically, we focus on blockchain data security that aims to mitigate the two data consistency attacks: double-spend attack and selfish mining attack. ...
INDEX TERMS Blockchain, double-spend attack, selfish mining attack, systematic review. ...
Selfish mining attack and block withholding attack are very similar since attackers usually withhold blocks for selfish mining [27] , [28] . ...
doi:10.1109/access.2020.3047365
fatcat:6ofb6os2mfea7alfc3l4hnbqly
A Structured Overview of Attacks on Blockchain Systems
2021
Pacific Asia Conference on Information Systems
Our results show that the academic discourse revolves mainly around the analysis of a few individual attacks, and most publications deal with attacks on either Bitcoin or Ethereum. ...
A majority of attacks are mitigable, and socio-technical components play an important role in both attacks and applying effective countermeasures. ...
For conciseness, the attack surface could be split into block generation (called mining in Bitcoin) and block validation. The former denotes the process of contributing a new block to the network. ...
dblp:conf/pacis/GuggenbergerSSU21
fatcat:mdcbofccurfxdiwudxwncwievi
MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
[article]
2021
arXiv
pre-print
We prove MAD-HTLC's security using the UC framework and game-theoretic analysis. ...
We demonstrate this attack can be easily implemented by patching the Bitcoin client, and use game-theoretic tools to qualitatively tighten the known cost bound of such bribery attacks in presence of rational ...
First, we discuss attacks and mitigations in a weaker model, where either A or B have significant mining power ( §VIII-1). ...
arXiv:2006.12031v3
fatcat:xjth2tcf35gtxegphnalg6onx4
« Previous
Showing results 1 — 15 out of 325 results