Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies.

作者: Laurent Vanbever , Aviv Zohar , Maria Apostolaki

DOI:

关键词:

摘要: Bitcoin is without a doubt the most successful cryptocurrency in circulation today, making it an extremely valuable target for attackers. Indeed, many studies have highlighted ways to compromise one or several nodes. In this paper, we take different perspective and study effect of large-scale network-level attacks such as ones that may be launched by Autonomous Systems (ASes). We show are commonly believed hard, isolating 50% mining power, actually within reach anyone with access BGP-enabled network hijacking less than 900 prefixes. Once on path, AS-level adversaries can then partition delay block propagation significantly. The key factors enable these extreme centralization Bitcoin, both from routing perspective, along fact messages sent unencrypted, integrity guarantees. demonstrate feasibility practice against deployed software quantify their disruptive network-wide impact. potential damage severe. By part delaying blocks, attackers cause significant amount power wasted, leading revenue losses enabling wide range double spending. We provide suggestions approaches mitigate employing short-term long-term measures.

参考文章(29)
Juan Garay, Aggelos Kiayias, Nikos Leonardos, The Bitcoin Backbone Protocol: Analysis and Applications theory and application of cryptographic techniques. pp. 281- 310 ,(2015) , 10.1007/978-3-662-46803-6_10
Till Neudecker, Philipp Andelfinger, Hannes Hartenstein, A simulation model for analysis of attacks on the Bitcoin peer-to-peer network integrated network management. pp. 1327- 1332 ,(2015) , 10.1109/INM.2015.7140490
Meni Rosenfeld, Analysis of Hashrate-Based Double Spending arXiv: Cryptography and Security. ,(2014)
Ittay Eyal, The Miner's Dilemma ieee symposium on security and privacy. pp. 89- 103 ,(2015) , 10.1109/SP.2015.13
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten, SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies 2015 IEEE Symposium on Security and Privacy. pp. 104- 121 ,(2015) , 10.1109/SP.2015.14
Pat Bosshart, Dan Daly, Glen Gibb, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, David Walker, P4: programming protocol-independent packet processors acm special interest group on data communication. ,vol. 44, pp. 87- 95 ,(2014) , 10.1145/2656877.2656890
Nick Feamster, Roger Dingledine, Location diversity in anonymity networks workshop on privacy in the electronic society. pp. 66- 76 ,(2004) , 10.1145/1029179.1029199
Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal, Anonymity on QuickSand: Using BGP to Compromise Tor hot topics in networks. pp. 14- ,(2014) , 10.1145/2670518.2673869
Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza, Zerocash: Decentralized Anonymous Payments from Bitcoin ieee symposium on security and privacy. pp. 459- 474 ,(2014) , 10.1109/SP.2014.36
Brandon Schlinker, Kyriakos Zarifis, Italo Cunha, Nick Feamster, Ethan Katz-Bassett, PEERING: An AS for Us hot topics in networks. pp. 18- ,(2014) , 10.1145/2670518.2673887