Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System

被引:48
|
作者
Gao, Shang [1 ]
Li, Zecheng [1 ]
Peng, Zhe [1 ]
Xiao, Bin [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
关键词
Bitcoin; blockchain; mining attacks; selfish mining; block withholding; fork after withholding; bribery attack;
D O I
10.1145/3319535.3354203
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mining attacks allow attackers to gain an unfair share of the mining reward by deviating from the honest mining strategy in the Bitcoin system. Among the most well-known are block withholding (BWH), fork after withholding (FAW), and selfish mining. In this paper, we propose two new strategies: power adjusting and bribery racing, and introduce two novel mining attacks, Power Adjusting Withholding (PAW) and Bribery Selfish Mining (BSM) adopting the new strategies. Both attacks can increase the reward of attackers. Furthermore, we show PAW can avoid the "miner's dilemma" in BWH attacks. BSM introduces a new "venal miner's dilemma", which results in all targets (bribes) willing to help the attacker but getting less reward finally. Quantitative analyses and simulations are conducted to verify the effectiveness of our attacks. We propose some countermeasures to mitigate the new attacks, but a practical and efficient solution remains to be an open problem.
引用
收藏
页码:833 / 850
页数:18
相关论文
共 50 条
  • [1] On Detection of Bitcoin Mining Redirection Attacks
    Courtois, Nicolas T.
    Emirdag, Pinar
    Wang, Zhouyixing
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 98 - 105
  • [2] Is Bitcoin Future as Secure asWe Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions
    Ebrahimpour, Ghader
    Haghighi, Mohammad Sayad
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (02)
  • [3] Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus
    Bonneau, Joseph
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2016, 9604 : 19 - 26
  • [4] Random Mining Group Selection to Prevent 51% Attacks on Bitcoin
    Bae, Jaewon
    Lim, Hyuk
    [J]. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 81 - 82
  • [5] A brief analysis of the concentration of Bitcoin mining power
    Llases, Luis
    [J]. PAPELES DE EUROPA, 2021, 34 (01): : 29 - 39
  • [6] A SURVEY: REWARD DISTRIBUTION MECHANISMS AND WITHHOLDING ATTACKS IN BITCOIN POOL MINING
    Zhu, Saide
    Li, Wei
    Li, Hong
    Hu, Chunqiang
    Cai, Zhipeng
    [J]. MATHEMATICAL FOUNDATIONS OF COMPUTING, 2018, 1 (04): : 393 - 414
  • [7] Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools
    Wu, Shuangke
    Chen, Yanjiao
    Li, Minghui
    Luo, Xiangyang
    Liu, Zhe
    Liu, Lan
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (02) : 874 - 887
  • [8] The Pure Price of Anarchy of Pool Block Withholding Attacks in Bitcoin Mining
    Alkalay-Houlihan, Colleen
    Shah, Nisarg
    [J]. THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, : 1724 - 1731
  • [9] The Bitcoin protocol as a system of power
    Zamani, Efpraxia D.
    [J]. ETHICS AND INFORMATION TECHNOLOGY, 2022, 24 (01)
  • [10] The Bitcoin protocol as a system of power
    Efpraxia D. Zamani
    [J]. Ethics and Information Technology, 2022, 24