2016
DOI: 10.48550/arxiv.1610.07985
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

An Analysis of Attacks on Blockchain Consensus

Abstract: We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. We account for an attacker capable of increasing profits by targeting multiple merchants simultaneously. Our model quantifies the importance of sev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…Other consensus attacks [12,53,58] exist but are less related to oracles. We omit discussion of them.…”
Section: Consensusmentioning
confidence: 99%
“…Other consensus attacks [12,53,58] exist but are less related to oracles. We omit discussion of them.…”
Section: Consensusmentioning
confidence: 99%
“…Most of them were focused on detecting the ponzi schemes [12,13,16]. Besides, a large number of studies focused on detecting and analyzing attacks from different levels, including blockchain consensus [14], smart contract [11], abnormal transactions [15,18], etc. Despite cryptocurrency exchanges are the key infrastructure of the blockchain ecosystem, however, the security-related issues, including the scam problem studied in this work, have not been well-studied yet.…”
Section: Related Workmentioning
confidence: 99%
“…The benefit is usually a portion of commission fee, depending on the referral rules of different exchanges 13 . Figure 12(4) is a code snippet of a Bithumb trojan app 14 . As highlighted in the decompiled code, it will collect users' text messages, contracts, and call logs secretly, and then upload them to http://bithumbinback.pro/, which was the attacker's private server.…”
Section: Classification Of Fake Appsmentioning
confidence: 99%
“…We will answer this question in a forthcoming article. In [3], the authors study the profitability of a double-spend attack with a cut-off time strategy, S z+1 ∧ S z+1 (in our notation). In [14] the authors consider a fixed cut-off time (in case of failure, the attack ends at a fixed time).…”
Section: Related Workmentioning
confidence: 99%