2022
DOI: 10.1007/978-3-031-18283-9_28
|View full text |Cite
|
Sign up to set email alerts
|

Three Attacks on Proof-of-Stake Ethereum

Abstract: We propose a model suggesting that honest-but-rational consensus participants may play timing games, and strategically delay their block proposal to optimize MEV capture, while still ensuring the proposal's timely inclusion in the canonical chain. In this context, ensuring economic fairness among consensus participants is critical to preserving decentralization. We contend that a model grounded in honest-but-rational consensus participation provides a more accurate portrayal of behavior in economically incenti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…However, Ref. [23] presents an attack called the Refined Reorg Attack on the new PoS Ethereum network, which could allow validators to earn more from validating blocks than others through the Maximal Extractable Value [24]. Ref.…”
Section: The Vulnerabilities Of Consensus Mechanismsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, Ref. [23] presents an attack called the Refined Reorg Attack on the new PoS Ethereum network, which could allow validators to earn more from validating blocks than others through the Maximal Extractable Value [24]. Ref.…”
Section: The Vulnerabilities Of Consensus Mechanismsmentioning
confidence: 99%
“…Ref. [23] details the attack as being that of a malicious actor who could propose a block in a slot, which keeps it hidden, while an honest block proposer would then place their block at the next slot, resulting in a bad actor being able to use both slots as a vote, which creates a probability that proposed blocks could be outnumbered by malicious actors.…”
Section: The Vulnerabilities Of Consensus Mechanismsmentioning
confidence: 99%
“…Validation committees serve as an additional security measure by allowing a voting process to take place between a small set of trusted validators, but they create various attack surfaces, introduce additional implementation complexity, and reduce the overall decentralization of the blockchain. Recent developments in blockchain security research have shown that the voting process that takes place between validators can be exploited in order to delay the consensus and increase the profits of malicious actors [Neuder et al 2021], potentially at the cost of a considerably smaller fraction of the total stake in the network [Schwarz-Schilling et al 2022] than the previous estimates of 33% based on the solution to the byzantine generals problem [Lamport et al 1982].…”
Section: Proof-of-stakementioning
confidence: 99%
“…validators are randomly chosen according to their financial participation, and are responsible for validating transactions and adding blocks to the chain. PoS is less energy-intensive than the PoW, but it does present the potential risk of centralizing power among holders of large quantities of tokens [11]. 3) Delegated Proof of Stake (DPoS): it is used by the EOS and Tron blockchains.…”
Section: B Consensus Algorithmsmentioning
confidence: 99%