2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00027
|View full text |Cite
|
Sign up to set email alerts
|

A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network

Abstract: Network adversaries, such as malicious transit autonomous systems (ASes), have been shown to be capable of partitioning the Bitcoin's peer-to-peer network via routing-level attacks; e.g., a network adversary exploits a BGP vulnerability and performs a prefix hijacking attack (viz. Apostolaki et al. [3]). Due to the nature of BGP operation, such a hijacking is globally observable and thus enables immediate detection of the attack and the identification of the perpetrator. In this paper, we present a stealthier … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
62
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(63 citation statements)
references
References 23 publications
0
62
0
Order By: Relevance
“…In nodes isolation attack, the attacker hijacks the honest nodes and splits the network into two or more disjointed groups [21], [97]. In Fig.…”
Section: ) Nodes Isolation (Partition) Attackmentioning
confidence: 99%
“…In nodes isolation attack, the attacker hijacks the honest nodes and splits the network into two or more disjointed groups [21], [97]. In Fig.…”
Section: ) Nodes Isolation (Partition) Attackmentioning
confidence: 99%
“…A variety of DoSes have been designed and practiced on the different layers of a blockchain system in smart-contract execution [44], [30], transaction processing [51], [34], [40], mining-based consensus [26], [60], and the underlying P2P network [54], [58], [43], [63]. For instance, in the P2P network layer, an eclipse attack [54], [58] aims to isolate a DoS-victim peer from the network and a routing attack [43], [63] employs BGP hijacking to intercept network traffic towards partitioning it. Among these attack vectors, of particular relevance are the DoSes that evade the Gas-based mechanism for smartcontract execution.…”
Section: Related Workmentioning
confidence: 99%
“…Partitioning attacks usually exploit vulnerable peer management mechanisms of Bitcoin [51] and Ethereum [52]. Such attacks are also examined in the context of ISP's BGP hijacking [53] and a stealthier variant relieving the attacker from the risk of getting exposed [54].…”
Section: Advertisement Redundancymentioning
confidence: 99%
“…Partitioning attacks usually exploit vulnerable peer management mechanisms of Bitcoin [51] and Ethereum [52]. Such attacks are also examined in the context of ISP's BGP hijacking [53] and a stealthier variant relieving the attacker from the risk of getting exposed [54]. Cryptocurrency mining has been a popular subject in assessing the security of Bitcoin; selfish mining [37], block withholding attack [36], and a mixed strategy [38] have been studied.…”
Section: Blockchain Attacksmentioning
confidence: 99%