Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








325 Hits in 3.8 sec

Computation Integrity Assurance for Emerging Distributed Computation Outsourcing Environments, The Case of Block Withholding Attack on Bitcoin Pools

Mehdi Shajari, Alireza Toroghi Haghighat
2020 IET Information Security  
Then, they discuss the 'Block Withholding' attack in cryptocurrency mining pools as a case study.  ...  Recently emerged distributed computation outsourcing environments (e.g. volunteer computing, crowdsourcing, cloud computing, and pooled mining in cryptocurrencies) provide many new opportunities and challenges  ...  Game theoretic analysis of the mitigation methods The first two proposed mitigation methods increase the time of running a profitable BW attack because any block withholder miner should submit at least  ... 
doi:10.1049/iet-ifs.2018.5496 fatcat:epwspvubibh2nn4hcwswrqqwcu

Block Double-Submission Attack: Block Withholding Can Be Self-Destructive [article]

Suhyeon Lee, Donghwan Lee, Seungjoo Kim
2022 arXiv   pre-print
One of them is a Block WithHolding (BWH) attack that can exploit a widespread and cooperative environment called a mining pool.  ...  This attack takes advantage of untrustworthy relationships between mining pools and participating agents.  ...  Detection and Mitigation of Block Double-Submission Attacks Multiple detections and evasion measures have been proposed against a BWH attack exploited by BDS attacks, including probabilistic detection,  ... 
arXiv:2208.05425v2 fatcat:g6f7jkprkfehdajclqb4ezamzq

Dependability Analysis of Bitcoin subject to Eclipse Attacks

Chencheng Zhou, Liudong Xing, Qisi Liu
2021 International journal of mathematical, engineering and management sciences  
a new challenge: the dependability modeling and analysis of the blockchain-based systems.  ...  We analyze the dependability of the Bitcoin system subject to the Eclipse attack.  ...  The authors would like to thank the editor and anonymous reviewers for their comments that help improve the quality of this work.  ... 
doi:10.33889/ijmems.2021.6.2.028 fatcat:jfjseg3bgrecnfc57dovyiykri

Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation

Chencheng Zhou, Liudong Xing, Qisi Liu, Honggang Wang
2021 International journal of mathematical, engineering and management sciences  
This paper models and analyzes the dependability of Bitcoin nodes subject to Eclipse attacks and state-dependent mitigation activities.  ...  A semi-Markov process (SMP) based approach is proposed to model the Eclipse attack behavior and possible mitigation activities that may prevent the attack from being successful during the attack process  ...  The authors would like to thank the editor and anonymous reviewers for their comments that help improve the quality of this work.  ... 
doi:10.33889/ijmems.2021.6.2.029 fatcat:hzspneiptvai7jhlvamiprwc4y

Contra-*: Mechanisms for Countering Spam Attacks on Blockchain's Memory Pools [article]

Muhammad Saad, Joongheon Kim, DaeHun Nyang, David Mohaisen
2021 arXiv   pre-print
We study this attack on Bitcoin mempool and explore the attack effects on transactions fee paid by benign users.  ...  Blockchain-based cryptocurrencies, such as Bitcoin, have seen on the rise in their popularity and value, making them a target to several forms of Denial-of-Service (DoS) attacks, and calling for a better  ...  block withholding, mempool.  ... 
arXiv:2005.04842v2 fatcat:e545mjnvjbcghf35ycbwbxoyqa

Exploring the Attack Surface of Blockchain: A Systematic Overview [article]

Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen
2019 arXiv   pre-print
(due to selfish behavior or distributed denial-of-service attacks), Blockchain forks, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks.  ...  A secondary contribution of this work is outlining effective defense measures taken by the Blockchain technology or proposed by researchers to mitigate the effects of these attacks and patch associated  ...  Classical block withholding attack: The block withholding attack is launched against decentralized mining pools with intent to harm the pool operator by withholding a valid PoW  ... 
arXiv:1904.03487v1 fatcat:bo67ns67enh3dpzzlmkbtbgx6i

Share Withholding Attack in Blockchain Mining: Technical Report [article]

Sang-Yoon Chang
2020 arXiv   pre-print
Prior research in blockchain security identified financially incentivized attacks based on withholding blocks which have the attacker compromise a victim pool and pose as a PoW contributor by submitting  ...  We advance such threats to generate greater reward advantage to the attackers while undermining the other miners and introduce the share withholding attack (SWH).  ...  These attacks are in the forms of block-withholding attack (BWH), fork-after-withholding (FAW), and uncle-block attack (UBA).  ... 
arXiv:2008.13317v1 fatcat:s6e6ve5uorfczlhhbosjsaf6h4

Congestion Attacks in Payment Channel Networks [article]

Ayelet Mizrahi, Aviv Zohar
2021 arXiv   pre-print
We consider three main versions of the attack: one in which the attacker attempts to block as many high liquidity channels as possible, one in which it disconnects as many pairs of nodes as it can, and  ...  Finally, we suggest mitigation techniques that make these attacks much harder to carry out.  ...  Acknowledgments We thank Itay Cohen, Nir Lavee and Zvi Yishai for providing improvements in our network partitioning algorithms and analysis.  ... 
arXiv:2002.06564v4 fatcat:pueqv4u3rbatbccgqp3mahrrny

Time-Dilation Attacks on the Lightning Network [article]

Antoine Riard, Gleb Naumenko
2020 arXiv   pre-print
The attacks require dilating the time for victims to become aware of new blocks by eclipsing (isolating) victims from the network and delaying block delivery.  ...  Lightning Network (LN) is a widely-used network of payment channels enabling faster and cheaper Bitcoin transactions.  ...  ACKNOWLEDGMENTS We are grateful to Suhas Daftuar and Matt Corallo for initial discussions on time-dilation attacks.  ... 
arXiv:2006.01418v1 fatcat:biec6xlpwbeildzlng4n76so44

Temporary Block Withholding Attacks on Filecoin's Expected Consensus

Tong Cao, Xin Li
2023 Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses  
In this paper, we propose three temporary block withholding attacks to challenge Filecoin's expected consensus (EC).  ...  withholding attacks without a loss in revenue, which could affect Filecoin's security and performance.  ...  We provide countermeasures to mitigate temporary block withholding attacks as follows. 8.3.1 Synchronizing Filecoin network and drand nework.  ... 
doi:10.1145/3607199.3607213 fatcat:eyntkvvbxjb6vfhag644y34xem

The Risks of the Blockchain A Review on Current Vulnerabilities and Attacks

Lukas König, Stefan Unger, Peter Kieseberg, Simon Tjoa
2020 Journal of Internet Services and Information Security  
In this article, we describe 24 risks, which we structured into the four domains "Blockchain Structure Vulnerabilities", "Attacks on the Consensus Mechanism", "Application Oriented Attacks" and "Attacks  ...  Stale and Orphaned Blocks Stale and Orphan Blocks are validated blocks that end up outside of the main blockchain.  ...  Fork After Withholding Attack The fork after withholding attack (FAW) is similar to the first option of classical block withholding attacks.  ... 
doi:10.22667/jisis.2020.08.31.110 dblp:journals/jisis/KonigUKT20 fatcat:n4qdpe54fbcibdcwfodgicgxyy

Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions [article]

Ghader Ebrahimpour, Mohammad Sayad Haghighi
2021 arXiv   pre-print
In this attack, the adversary misuses the Bitcoin protocol to bribe miners and maximize their gained advantage.  ...  In this paper, we design a novel bribery attack and show that this guarantee can be hugely undermined.  ...  Block withholding attack was initially proposed by Rosenfeld in 2011. There are two types of block withholding attack [26] .  ... 
arXiv:2105.07501v1 fatcat:gpvwtuotwzf53hzyabs5s3oh7y

Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach

Kervins Nicolas, Yi Wang, George C. Giakos, Bingyang Wei, Hongda Shen
2020 IEEE Access  
Specifically, we focus on blockchain data security that aims to mitigate the two data consistency attacks: double-spend attack and selfish mining attack.  ...  INDEX TERMS Blockchain, double-spend attack, selfish mining attack, systematic review.  ...  Selfish mining attack and block withholding attack are very similar since attackers usually withhold blocks for selfish mining [27] , [28] .  ... 
doi:10.1109/access.2020.3047365 fatcat:6ofb6os2mfea7alfc3l4hnbqly

A Structured Overview of Attacks on Blockchain Systems

Tobias Guggenberger, Vincent Schlatt, Jonathan Schmid, Nils Urbach
2021 Pacific Asia Conference on Information Systems  
Our results show that the academic discourse revolves mainly around the analysis of a few individual attacks, and most publications deal with attacks on either Bitcoin or Ethereum.  ...  A majority of attacks are mitigable, and socio-technical components play an important role in both attacks and applying effective countermeasures.  ...  For conciseness, the attack surface could be split into block generation (called mining in Bitcoin) and block validation. The former denotes the process of contributing a new block to the network.  ... 
dblp:conf/pacis/GuggenbergerSSU21 fatcat:mdcbofccurfxdiwudxwncwievi

MAD-HTLC: Because HTLC is Crazy-Cheap to Attack [article]

Itay Tsabary, Matan Yechieli, Alex Manuskin, Ittay Eyal
2021 arXiv   pre-print
We prove MAD-HTLC's security using the UC framework and game-theoretic analysis.  ...  We demonstrate this attack can be easily implemented by patching the Bitcoin client, and use game-theoretic tools to qualitatively tighten the known cost bound of such bribery attacks in presence of rational  ...  First, we discuss attacks and mitigations in a weaker model, where either A or B have significant mining power ( §VIII-1).  ... 
arXiv:2006.12031v3 fatcat:xjth2tcf35gtxegphnalg6onx4
« Previous Showing results 1 — 15 out of 325 results