TY - GEN
T1 - Eclipse attacks on Bitcoin’s peer-to-peer network
AU - Heilman, Ethan
AU - Kendler, Alison
AU - Zohar, Aviv
AU - Goldberg, Sharon
N1 - Publisher Copyright: © 2015 Proceedings of the 24th USENIX Security Symposium. All rights reserved.
PY - 2015
Y1 - 2015
N2 - We present eclipse attacks on bitcoin’s peer-to-peer network. Our attack allows an adversary controlling a sufficient number of IP addresses to monopolize all connections to and from a victim bitcoin node. The attacker can then exploit the victim for attacks on bitcoin’s mining and consensus system, including N-confirmation double spending, selfish mining, and adversarial forks in the blockchain. We take a detailed look at bitcoin’s peer-to-peer network, and quantify the resources involved in our attack via probabilistic analysis, Monte Carlo simulations, measurements and experiments with live bitcoin nodes. Finally, we present countermeasures, inspired by botnet architectures, that are designed to raise the bar for eclipse attacks while preserving the openness and decentralization of bitcoin’s current network architecture.
AB - We present eclipse attacks on bitcoin’s peer-to-peer network. Our attack allows an adversary controlling a sufficient number of IP addresses to monopolize all connections to and from a victim bitcoin node. The attacker can then exploit the victim for attacks on bitcoin’s mining and consensus system, including N-confirmation double spending, selfish mining, and adversarial forks in the blockchain. We take a detailed look at bitcoin’s peer-to-peer network, and quantify the resources involved in our attack via probabilistic analysis, Monte Carlo simulations, measurements and experiments with live bitcoin nodes. Finally, we present countermeasures, inspired by botnet architectures, that are designed to raise the bar for eclipse attacks while preserving the openness and decentralization of bitcoin’s current network architecture.
UR - http://www.scopus.com/inward/record.url?scp=85070733097&partnerID=8YFLogxK
M3 - منشور من مؤتمر
T3 - Proceedings of the 24th USENIX Security Symposium
SP - 129
EP - 144
BT - Proceedings of the 24th USENIX Security Symposium
T2 - 24th USENIX Security Symposium
Y2 - 12 August 2015 through 14 August 2015
ER -