If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable

被引:1
|
作者
Yang, Zheng [1 ]
Yin, Chao [2 ]
Ke, Junming [3 ]
Dinh, Tien Tuan Anh [4 ]
Zhou, Jianying [4 ]
机构
[1] Southwest Univ, Chongqing, Peoples R China
[2] Vrije Univ, Amsterdam, Netherlands
[3] Univ Tartu, Tartu, Estonia
[4] Singapore Univ Technol & Design, Singapore, Singapore
关键词
Bitcoin; mining attack; block withholding attack; fork after withholding; power adjusting; protection racket; ATTACKS;
D O I
10.1145/3564625.3567983
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pooled mining has become the most popular mining approach in the Bitcoin system, which can effectively reduce the variance of the block generation reward of participants. The security of pooled mining depends on whether it is incentive compatible, that is, an honest participant will get a reward proportional to hiswork. Recent attacks on mining pools, for example, Block Withholding, Fork After Withholding, and Power Adjusting Withholding (PAW) attacks, show that malicious participants may undermine the revenue of the honest pools and receive an unfair share of the mining reward. This paper shows that the security of Bitcoin is even worse than what the recent attacks demonstrated. We describe an attack called Fork Withholding Attack under a Protection Racket (FWAP), in which the mining pool pays the attacker for withholding a fork. Our insight is that the mining pools under forking attacks have incentives to pay in exchange for not being forked. The attacker and the paying pool negotiate how much to be paid, and we show that it is possible for both the attacker and the paying pool to earn higher rewards at the expense of the other pools. In particular, our formal analysis and simulation demonstrate that the payer and the FWAP attacker can get up to 1.8x and 3.8x of extra reward as in PAW, respectively. Furthermore, FWAP can escape from the "miners' dilemma" when two FWAP attackers attack each other under some circumstances. We also propose simple approaches that serve as the first step towards preventing the FWAP attack.
引用
收藏
页码:727 / 741
页数:15
相关论文
共 50 条
  • [1] If you can't beat them join them
    Wechsler, Henry
    [J]. ADDICTION, 2008, 103 (06) : 951 - 952
  • [2] If you can't join them, beat them
    Williams, Chris
    [J]. ELECTRONICS WORLD, 2007, 113 (1854): : 48 - 50
  • [3] If you can't beat them, buy them
    Lennighan, Mary
    [J]. Total Telecom, 2006, (JAN.): : 10 - 11
  • [4] If You Can't Join Them, Beat Them
    Hermes, Joke
    [J]. TELEVISION & NEW MEDIA, 2009, 10 (01) : 83 - 85
  • [5] If you can't beat them, join them
    Kiernan, V
    [J]. NEW SCIENTIST, 1996, 150 (2024) : 5 - 5
  • [6] If you can't beat them, augment them
    Saeed, Ahmed
    Ammar, Mostafa
    Zegura, Ellen
    Harras, Khaled
    [J]. 2018 IEEE 26TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2018, : 378 - 388
  • [7] If you can't beat them
    Dixon, B
    [J]. CURRENT BIOLOGY, 1997, 7 (03) : R124 - R124
  • [8] If you can't beat them
    Wilson, Dave
    [J]. Engineer, 2010, NOVEMBER
  • [9] QoSoDoS: If You Can't Beat Them, Join Them!
    Geva, Moti
    Herzberg, Amir
    [J]. 2011 PROCEEDINGS IEEE INFOCOM, 2011, : 1278 - 1286
  • [10] IP+ATM: If you can't beat them, join them
    Newman, P
    [J]. IEEE ATM '97 WORKSHOP, PROCEEDINGS, 1997, : 15 - 15