• Corpus ID: 7785652

Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies

@article{Apostolaki2016HijackingBL,
  title={Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies},
  author={Maria Apostolaki and Aviv Zohar and Laurent Vanbever},
  journal={ArXiv},
  year={2016},
  volume={abs/1605.07524}
}
Bitcoin is without a doubt the most successful cryptocurrency in circulation today, making it an extremely valuable target for attackers. Indeed, many studies have highlighted ways to compromise one or several Bitcoin nodes. In this paper, we take a different perspective and study the effect of large-scale network-level attacks such as the ones that may be launched by Autonomous Systems (ASes). We show that attacks that are commonly believed to be hard, such as isolating 50% of the mining… 

Figures and Tables from this paper

Dandelion: Redesigning the Bitcoin Network for Anonymity
TLDR
In this context, egalitarianism means that no single party wields disproportionate power over the network's operation, and transparency means that all transactions are verified and recorded with cryptographic integrity guarantees; this prevents fraudulent activity like double-spending of money.
Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees
TLDR
This work presents Dandelion++, a first-principles defense against large-scale deanonymization attacks with near-optimal information-theoretic guarantees, and evaluates it through experiments on Bitcoin's mainnet to demonstrate its interoperability and low broadcast latency overhead.
Decentralization in Bitcoin and Ethereum Networks
TLDR
The extent of decentralization is investigated by measuring the network resources of nodes and the interconnection among them, the protocol requirements affecting the operation of nodes, and the robustness of the two systems against attacks.
Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff
TLDR
This paper identifies and analyzes, a novel Denial-of-Service attack which is based on route hijacking, i.e., which exploits the way transactions are routed and executed along the created channels of the network.
Towards Better Understanding of Bitcoin Unreachable Peers
TLDR
A large scale measurement study of the Bitcoin network is conducted, and several previously unreported usage patterns are discovered: a small number of peers are involved in the propagation of 89% of all bitcoin transactions, public cloud services are being used for Bitcoin network probing and crawling, a large amount of transactions are generated from only two mobile applications.
TwistedPair : Towards Practical Anonymity in the Bitcoin P 2 P Network
  • Computer Science
  • 2017
TLDR
This work presents TwistedPair, a first-principles, theoreticallyjustified defense against large-scale deanonymization attacks, which is lightweight, scalable, and completely interoperable with the existing Bitcoin network.
CCP: Conflicts Check Protocol for Bitcoin Block Security
  • Chen Yang, Haohong Wang
  • Computer Science
    2018 International Conference on Computing, Networking and Communications (ICNC)
  • 2018
TLDR
Experimental results verified the statistical assumption and proved that the CCP is robust in handling many transactions in confliction scenarios and can significantly enhance the security of the current bitcoin systems.
A survey of data transfer and storage techniques in prevalent cryptocurrencies and suggested improvements
TLDR
This thesis focuses on aspects related to the functioning of the gossip networks underlying three relatively popular cryptocurrencies: Ethereum, Nano and IOTA, and provides a complete implementation of Graphene in Geth, Ethereum's main node software and test this implementation against the main Ethereum blockchain.
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
TLDR
OmniLedger ensures security and correctness by using a bias-resistant public-randomness protocol for choosing large, statistically representative shards that process transactions, and by introducing an efficient cross-shard commit protocol that atomically handles transactions affecting multiple shards.
OmniLedger : A Secure , Scale-Out , Decentralized Ledger via Sharding
TLDR
OmniLedger ensures security and correctness by using a bias-resistant public-randomness protocol for choosing large, statistically representative shards that process transactions, and by introducing an efficient crossshard commit protocol that atomically handles transactions affecting multiple shards.
...
...

References

SHOWING 1-10 OF 40 REFERENCES
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
TLDR
This work identifies three key components of Bit coin's design that can be decoupled, and maps the design space for numerous proposed modifications, providing comparative analyses for alternative consensus mechanisms, currency allocation mechanisms, computational puzzles, and key management tools.
How secure are secure interdomain routing protocols
TLDR
This work quantifies the ability of the main protocols to blunt traffic-attraction attacks; i.e., an attacker that deliberately attracts traffic to drop, tamper, or eavesdrop on packets, and finds that a clever export policy can often attract almost as much traffic as a bogus path announcement.
Tampering with the Delivery of Blocks and Transactions in Bitcoin
TLDR
It is shown that current scalability measures adopted by Bitcoin come at odds with the security of the system, and that an adversary can exploit these measures in order to effectively delay the propagation of transactions and blocks to specific nodes for a considerable amount of time---without causing a network partitioning in the system.
Majority is not enough
TLDR
This work shows that the Bitcoin mining protocol is not incentive-compatible, and proposes a practical modification to the Bitcoin protocol that protects Bitcoin in the general case, and prohibits selfish mining by a coalition that command less than 1/4 of the resources.
Secure High-Rate Transaction Processing in Bitcoin
TLDR
The GHOST rule is addressed, a modification to the way Bitcoin nodes construct and re-organize the block chain, Bitcoin’s core distributed data-structure, to address security concerns over high transaction throughput.
Practical defenses against BGP prefix hijacking
TLDR
This paper proposes a novel reactive detection-assisted solution based on the idea of bogus route purging and valid route promotion, and is the first to demonstrate that detection systems based on a limited number of BGP feeds are subject to detection evasion by hijackers.
Eclipse Attacks on Bitcoin's Peer-to-Peer Network
TLDR
This work takes a detailed look at bitcoin's peer-to-peer network, and quantifies the resources involved in the attack via probabilistic analysis, Monte Carlo simulations, measurements and experiments with live bitcoin nodes.
Detecting prefix hijackings in the internet with argus
TLDR
Argus, an agile system that can accurately detect prefix hijackings and deduce the underlying cause of route anomalies in a very fast way is proposed, based on correlating the control and data plane information closely and pervasively.
The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
TLDR
It is argued that Bitcoin will require the emergence of governance structures, contrary to the commonly held view in the Bitcoin community that the currency is ungovernable.
iSPY: Detecting IP Prefix Hijacking on My Own
TLDR
iSPY, a real-time hijacking detection system that can differentiate between IP prefix hijacking and network failures based on the observation that hijacking is likely to result in topologically more diverse polluted networks and unreachability, is presented.
...
...