Proceedings of the 6th International Conference on Information Systems Security and Privacy 2020
DOI: 10.5220/0009429200070014
|View full text |Cite
|
Sign up to set email alerts
|

Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain Networks

Abstract: Cryptocurrency off-chain networks such as Lightning (e.g., Bitcoin) or Raiden (e.g., Ethereum) aim to increase the scalability of traditional onchain transactions. To support nodes in learning about possible paths to route their transactions, these networks need to provide gossip and probing mechanisms. This paper explores whether these mechanisms may be exploited to infer sensitive information about the flow of transactions, and eventually harm privacy. In particular, we identify two threats, related to an ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(26 citation statements)
references
References 4 publications
0
26
0
Order By: Relevance
“…The considerable higher timelocks in shadow routing facilitate longer fund reservation and hence increase the severity of the attack. Furthermore, timing attacks still allow inferring the hop distance to the receiver in practice [20].…”
Section: Lightning Multi-hop Paymentsmentioning
confidence: 99%
See 1 more Smart Citation
“…The considerable higher timelocks in shadow routing facilitate longer fund reservation and hence increase the severity of the attack. Furthermore, timing attacks still allow inferring the hop distance to the receiver in practice [20].…”
Section: Lightning Multi-hop Paymentsmentioning
confidence: 99%
“…However, the evaluation was limited in the sense that only paths of up to length 5 was allowed between any pair of nodes. Other works evaluating the anonymity in Bitcoin's Lightning network studied the effectiveness of inferring the receiver through timing attacks [20], linkability of payments at different locations in the network [17], and an attack that determines whether the predecessor is indeed the source [13]. The only attack that explicitly makes use of Lightning's predictable routing targets availability rather than anonymity [29].…”
Section: Introductionmentioning
confidence: 99%
“…Off-chain networks, in particular, attracted many researchers to study possible attacks. Some of these attacks overload the channels with pending transactions to DoS the network [26], create congestion in the underlined blockchain to steal money [15], and deanonymize users with active and passive timing attacks [31], [34].…”
Section: Related Workmentioning
confidence: 99%
“…Concurrently to our work, Kappos et al [33] refine prior approaches of traffic simulation and introduce a probabilistic model based on observed path lengths in order to estimate probable payment endpoints. Moreover, while a recent entry by Nisslmueller et al [48] mention the possibility of timing attacks, their investigation remains in a preliminary state.…”
Section: Related Workmentioning
confidence: 99%