Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2022

03.08.2022

Revisiting FAW attack in an imperfect PoW blockchain system

verfasst von: Haoran Zhu, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Runkai Yang

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Malicious miners in a Proof-of-Work (PoW) blockchain can apply less computing power to perform fork-after-withholding (FAW) attack than that to selfish mining and other withholding attacks. Quantitative study of FAW attack enables an in-depth understanding of the attack and then helps design countermeasures. The existing quantification studies of FAW attack only considered a perfect Bitcoin blockchain, where there is no block propagation delay. This paper aims to quantitatively investigate FAW attack in imperfect Bitcoin and Ethereum systems. We first establish an analytic model to capture the chain dynamics under FAW attack in a PoW system where the longest-chain protocol is used. Then the model is explored to derive closed-formed metric formulas for Bitcoin and Ethereum, respectively. These closed-formed formulas enable the evaluation of both the profitability of FAW adversaries and the impact of FAW attack on system throughput. Experimental results reveal that FAW adversaries can get more revenue in the network with propagation delay than without delay. FAW attack can reduce the blockchain throughput, especially in Bitcoin.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus Rev 21260 Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus Rev 21260
3.
Zurück zum Zitat Kwon Y, Kim D, Son Y, Vasserman E, Kim Y (2017) Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. ACM CCS 2017, Dallas, TX, USA, pp 195–209 Kwon Y, Kim D, Son Y, Vasserman E, Kim Y (2017) Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin. ACM CCS 2017, Dallas, TX, USA, pp 195–209
5.
Zurück zum Zitat Eyal I, Sirer EG (2014) Majority Is Not Enough: Bitcoin Mining Is Vulnerable, Financial Cryptography, Berlin. Heidelberg 2014:436–454MATH Eyal I, Sirer EG (2014) Majority Is Not Enough: Bitcoin Mining Is Vulnerable, Financial Cryptography, Berlin. Heidelberg 2014:436–454MATH
6.
Zurück zum Zitat Yang R, Chang X, Misic J, Misic V (2020) Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. Comput Secur 97:101956CrossRef Yang R, Chang X, Misic J, Misic V (2020) Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. Comput Secur 97:101956CrossRef
7.
Zurück zum Zitat Ke J, Jiang H, Song X, Zhao S, Wang H, Xu Q (2018) Analysis on the Block Reward of Fork After Withholding (FAW),” NSysS 2018, Dhaka, Bangladesh, December 2018. pp 16–31 Ke J, Jiang H, Song X, Zhao S, Wang H, Xu Q (2018) Analysis on the Block Reward of Fork After Withholding (FAW),” NSysS 2018, Dhaka, Bangladesh, December 2018. pp 16–31
8.
Zurück zum Zitat Courtois NT, Bahack L (2014) On subversive miner strategies and block withholding attack in bitcoin digital currency”. arXiv preprint arXiv:1402.1718 Courtois NT, Bahack L (2014) On subversive miner strategies and block withholding attack in bitcoin digital currency”. arXiv preprint arXiv:​1402.​1718
9.
Zurück zum Zitat Yang R, Chang X, Mišić J, Mišić VB, Kang H (2021) On Selfholding Attack Impact on Imperfect PoW Blockchain Networks. IEEE Trans Netw Sci Eng Yang R, Chang X, Mišić J, Mišić VB, Kang H (2021) On Selfholding Attack Impact on Imperfect PoW Blockchain Networks. IEEE Trans Netw Sci Eng
13.
Zurück zum Zitat Buterin V (2014) A next-generation smart contract and decentralized application platform,” white paper. 3(37) Buterin V (2014) A next-generation smart contract and decentralized application platform,” white paper. 3(37)
14.
Zurück zum Zitat Li X, Jiang P, Chen T, Luo X, Wen Q (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841–853CrossRef Li X, Jiang P, Chen T, Luo X, Wen Q (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841–853CrossRef
15.
Zurück zum Zitat Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, Mohaisen D (2020) Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun Surv Tutorials 22(3):1977–2008CrossRef Saad M, Spaulding J, Njilla L, Kamhoua C, Shetty S, Nyang D, Mohaisen D (2020) Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun Surv Tutorials 22(3):1977–2008CrossRef
16.
Zurück zum Zitat Zaghloul E, Li T, Mutka M, Ren J (2020) Bitcoin and Blockchain: Security and Privacy. IEEE Internet Things J 7(10):10288–10313CrossRef Zaghloul E, Li T, Mutka M, Ren J (2020) Bitcoin and Blockchain: Security and Privacy. IEEE Internet Things J 7(10):10288–10313CrossRef
17.
Zurück zum Zitat Chen H, Pendleton M, Njilla L, Xu S (2020) A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defense. ACM Comput Surv 53(3):67:1–67:43 Chen H, Pendleton M, Njilla L, Xu S (2020) A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defense. ACM Comput Surv 53(3):67:1–67:43
18.
Zurück zum Zitat Chang SY, Park Y, Wuthier S, Chen CW (2019) Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners. ACNS 241–258 Chang SY, Park Y, Wuthier S, Chen CW (2019) Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners. ACNS 241–258
19.
Zurück zum Zitat Gao S, Li Z, Peng Z, Xiao B (2019) Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. CCS 833–850 Gao S, Li Z, Peng Z, Xiao B (2019) Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System. CCS 833–850
20.
Zurück zum Zitat Kang H, Chang X, Yang R, Mišić J, Mišić VB (2021) Understanding selfish mining in imperfect bitcoin and ethereum networks with extended forks. IEEE Trans Netw Service Manag 18(3):3079–3091CrossRef Kang H, Chang X, Yang R, Mišić J, Mišić VB (2021) Understanding selfish mining in imperfect bitcoin and ethereum networks with extended forks. IEEE Trans Netw Service Manag 18(3):3079–3091CrossRef
21.
Zurück zum Zitat Göbel J, Keeler H, Krzesinski A, Taylor P (2016) Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform Evaluation 104:23–41CrossRef Göbel J, Keeler H, Krzesinski A, Taylor P (2016) Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Perform Evaluation 104:23–41CrossRef
22.
Zurück zum Zitat Carlsten M, Kalodner H, Weinberg SM, Narayanan A (2016) On the Instability of Bitcoin Without the Block Reward. CCS 154–167 Carlsten M, Kalodner H, Weinberg SM, Narayanan A (2016) On the Instability of Bitcoin Without the Block Reward. CCS 154–167
23.
Zurück zum Zitat Ritz F, Zugenmaier A (2018) The Impact of Uncle Rewards on Selfish Mining in Ethereum. EuroS&P Workshops 50–57 Ritz F, Zugenmaier A (2018) The Impact of Uncle Rewards on Selfish Mining in Ethereum. EuroS&P Workshops 50–57
24.
Zurück zum Zitat Feng C, Niu J (2019) Selfish Mining in Ethereum. ICDCS 1306–1316 Feng C, Niu J (2019) Selfish Mining in Ethereum. ICDCS 1306–1316
25.
Zurück zum Zitat Misic J, Misic VB, Chang X (2019) On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network. GLOBECOM 1–6 Misic J, Misic VB, Chang X (2019) On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network. GLOBECOM 1–6
Metadaten
Titel
Revisiting FAW attack in an imperfect PoW blockchain system
verfasst von
Haoran Zhu
Xiaolin Chang
Jelena Mišić
Vojislav B. Mišić
Runkai Yang
Publikationsdatum
03.08.2022
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2022
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01360-1

Weitere Artikel der Ausgabe 5/2022

Peer-to-Peer Networking and Applications 5/2022 Zur Ausgabe

Premium Partner