Is Stellar As Secure As You Think?

被引:16
|
作者
Kim, Minjeong [1 ]
Kwon, Yujin [1 ]
Kim, Yongdae [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Daejeon, South Korea
关键词
D O I
10.1109/EuroSPW.2019.00048
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Stellar is one of the top ten cryptocurrencies in terms of market capitalization. It adopts a variant of Byzantine fault tolerance (BFT), named federated Byzantine agreement (FBA), which generalizes the traditional BFT algorithm to make it more suitable for open-membership blockchains. To this end, FBA introduces a concept called quorum slice, which consists of a set of nodes. In FBA, a node can complete one consensus round when it receives specific messages from nodes in a quorum slice appointed by the node. In this study, we analyze FBA, whose security is highly dependent on the structure of the quorum slices, and demonstrate that it is not superior to the traditional BFT algorithm in terms of safety and liveness. Then, to analyze the security of the Stellar consensus protocol (SCP), which is a construction for FBA, we investigate the current quorum slices in Stellar. We analyze the structure of quorum slices and measure the influence of each node quantitatively using two metrics, PageRank (PR) and the newly proposed NodeRank (NR). The results show that the Stellar system is significantly centralized. Thereafter, to determine how the centralized structure can have a negative impact on the Stellar system, we study the cascading failure caused by deleting only a few nodes (i.e., validators) in Stellar. We show that all of the nodes in Stellar cannot run SCP if only two nodes fail. To make matters worse, these two nodes are run and controlled by a single organization, the Stellar foundation.
引用
收藏
页码:377 / 385
页数:9
相关论文
共 50 条
  • [1] Do You Think Your Passwords Are Secure?
    Ziegler, Dominik
    Rauter, Mattias
    Stromberger, Christof
    Teufl, Peter
    Hein, Daniel
    [J]. 2014 INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS), 2014,
  • [2] Wireless networks are not secure - (Duh! - you think?)
    Hancock, B
    [J]. COMPUTERS & SECURITY, 2001, 20 (07) : 557 - 559
  • [3] If you think you're overworked, think again
    Hadfield, P
    [J]. NEW SCIENTIST, 2001, 172 (2320) : 15 - 15
  • [4] 'Right you are (if you think you are)'
    Baker, Elizabeth C.
    [J]. ART IN AMERICA, 2008, 96 (03): : 52 - 53
  • [5] Are you as good as you think you are?
    Martin, J
    [J]. FORTUNE, 1996, 134 (06) : 142 - &
  • [6] IF YOU THINK
    Edwards, Chris
    [J]. OVERLAND, 2017, (228): : 67 - 67
  • [7] If You Think You Are Beaten
    Walter D. Wintle
    [J]. 中学生天地(C版), 2010, (04) : 1 - 1
  • [8] 'You Think You Hear'
    Sutton, B
    [J]. NEW YORK TIMES BOOK REVIEW, 2001, : 16 - 16
  • [9] How "What you think you know about cybersecurity" can help users make more secure decisions
    Bahreini, Amir Fard
    Cavusoglu, Hasan
    Cenfetelli, Ronald T.
    [J]. INFORMATION & MANAGEMENT, 2023, 60 (07)
  • [10] You're Not the Outlaw You Think You Are
    O'Callaghan, Conor
    [J]. POETRY, 2009, 194 (04) : 379 - 380