Reconstructing hash reversal based proof of work schemes

作者: Jeff Green , Joshua Juen , Omid Fatemieh , Ravinder Shankesi , Dong Jin

DOI:

关键词:

摘要: Proof of work schemes use client puzzles to manage limited resources on a server and provide resilience denial service attacks. Attacks utilizing GPUs inflate computational capacity, known as resource inflation, are novel powerful threat that dramatically increase the disparity between clients. This renders proof based hash reversal ineffective potentially destructive. paper examines various such in view GPU-based attacks identifies characteristics allow defense mechanisms withstand In particular, we demonstrate that, hash-reversal which adapt solely load under attack by GPU adversaries; whereas, behavior effective even

参考文章(21)
Ben Laurie, Richard Clayton, \Proof-of-Work" Proves Not to Work ,(2004)
Ari Juels, John G. Brainard, Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. network and distributed system security symposium. ,(1999)
Ravinder Shankesi, Carl A. Gunter, Omid Fatemieh, Resource Inflation Threats to Denial of Service Countermeasures ,(2010)
D. Mankins, R. Krishnan, C. Boyd, J. Zao, M. Frentz, Mitigating distributed denial of service attacks with dynamic resource pricing annual computer security applications conference. pp. 411- 421 ,(2001) , 10.1109/ACSAC.2001.991558
Ari Juels, Markus Jakobsson, Proofs of Work and Bread Pudding Protocols communications and multimedia security. pp. 258- 272 ,(1999)
Adam Stubblefield, Drew Dean, Using client puzzles to protect TLS usenix security symposium. pp. 1- 1 ,(2001)
Cynthia Dwork, Andrew Goldberg, Moni Naor, On Memory-Bound Functions for Fighting Spam Advances in Cryptology - CRYPTO 2003. pp. 426- 444 ,(2003) , 10.1007/978-3-540-45146-4_25
Wu-chang Feng, E. Kaiser, Wu-chi Feng, A. Luu, Design and implementation of network puzzles international conference on computer communications. ,vol. 4, pp. 2372- 2382 ,(2005) , 10.1109/INFCOM.2005.1498523
Ed Kaiser, Wu chang Feng, mod_kaPoW Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07. pp. 74- ,(2007) , 10.1145/1364654.1364737