Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3488932.3497757acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Evaluating Blockchain Protocols with Abusive Modeling

Published: 30 May 2022 Publication History

Abstract

Strategic evaluations of blockchain systems allow a better understanding of the security of the mining process. In recent years, many researchers have focused on developing optimal strategies to evaluate the impact of an adversary on the mining process using different attack situations such as selfish mining, double-spending, feather-forking, Denial of Service. These strategies rely on the use of the Markov Decision Process (MDP) to find optimal settings that an adversary can exploit to earn maximum profit in every round. However, these strategies do not consider a case where adversaries turn abusive, and their only aim is to harm the mining process without profit. Motivated by this, a self-defying adversary model is proposed that uses ZEBRA (Zero Expectation-Based Reward Abuse) strategy to cause a maximum impact on the rewards of the honest players at lower settings. With the proposed method, the adversary itself may not be profitable, but has better control over the chain growth and causes maximum damage to reward by delaying the blocks and inducing forks subject to its compliance degree. The evaluations are demonstrated to show the reward control by the adversary along with the impact on delays and forks, followed by the possibilities of attacks using the hashing powers of different mining pools.

Supplementary Material

MKV File (ASIA-CCS22-asiafp060.mkv)
Pre-recorded Presentation Video- Evaluating Blockchain Protocols with Abusive Modeling

References

[1]
Christian Badertscher, Peter Gavz i, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. 2018. Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 913--930.
[2]
Fischer Black. 1976. The pricing of commodity contracts. Journal of financial economics, Vol. 3, 1-2 (1976), 167--179.
[3]
Joseph Bonneau. 2016. Why buy when you can rent?. In International Conference on Financial Cryptography and Data Security. Christ Church, Barbados, 22--26 February, 19-26.
[4]
Joseph Bonneau. 2018. Hostile blockchain takeovers (short paper). In International Conference on Financial Cryptography and Data Security. Nieuwpoort, Curaçao, 26 February - 2 March, 92--100.
[5]
Rhys Bowden, H. Paul Keeler, Anthony E. Krzesinski, and Peter G. Taylor. 2018. Block arrivals in the Bitcoin blockchain. CoRR, Vol. abs/1801.07447 (2018). arxiv: 1801.07447 http://arxiv.org/abs/1801.07447
[6]
San-Lin Chung and Mark Shackleton. 2002. The binomial Black--Scholes model and the Greeks. Journal of Futures Markets: Futures, Options, and Other Derivative Products, Vol. 22, 2 (2002), 143--153.
[7]
Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In IEEE P2P Proceedings. IEEE, 1--10.
[8]
Robert J Elliott, John Van Der Hoek*, and William P Malcolm. 2005. Pairs trading. Quantitative Finance, Vol. 5, 3 (2005), 271--276.
[9]
Ittay Eyal. 2015. The miner's dilemma. In 2015 IEEE Symposium on Security and Privacy. IEEE, 89--103.
[10]
Ittay Eyal and Emin Gün Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In International conference on financial cryptography and data security. Springer, 436--454.
[11]
Arthur Gervais, Ghassan O Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 3--16.
[12]
Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin's peer-to-peer network. In 24th {USENIX} Security Symposium ({USENIX} Security). 129--144.
[13]
Ghassan Karame. 2016. On the security and scalability of bitcoin's blockchain. In Proceedings of the ACM SIGSAC conference on computer and communications security. 1861--1862.
[14]
Ghassan Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending fast payments in bitcoin. In the ACM Conference on Computer and Communications Security, CCS'12, Ting Yu, George Danezis, and Virgil D. Gligor (Eds.). ACM, 906--917.
[15]
Reiichiro Kawai and Atsushi Takeuchi. 2011. Greeks formulas for an asset price model with gamma processes. Mathematical Finance: An International Journal of Mathematics, Statistics and Financial Economics, Vol. 21, 4 (2011), 723--742.
[16]
William S Lovejoy. 1991. A survey of algorithmic methods for partially observed Markov decision processes. Annals of Operations Research, Vol. 28, 1 (1991), 47--65.
[17]
Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, and Ari Jules. 2019. BDoS: Blockchain Denial of Service. arXiv preprint arXiv:1912.07497 (2019).
[18]
Satoshi Nakamoto. 2019. Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot.
[19]
Kartik Nayak, Srijan Kumar, Andrew Miller, and Elaine Shi. 2016. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack. In 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 305--320.
[20]
Piotr S Olszewski. 1994. Modeling probability distribution of delay at signalized intersections. Journal of advanced transportation, Vol. 28, 3 (1994), 253--274.
[21]
Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, and Jianying Zhou. 2021. LaKSA: A Probabilistic Proof-of-Stake Protocol. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021. The Internet Society. https://www.ndss-symposium.org/ndss-paper/laksa-a-probabilistic-proof-of-stake-protocol/
[22]
Mehrdad Salimitari, Mainak Chatterjee, Murat Yuksel, and Eduardo Pasiliao. 2017. Profit maximization for bitcoin pool mining: A prospect theoretic approach. In International conference on collaboration and internet computing (CIC). IEEE, 267--274.
[23]
Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal Selfish Mining Strategies in Bitcoin. In Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers (Lecture Notes in Computer Science, Vol. 9603). Springer, 515--532.
[24]
Linn I Sennott. 1991. Value iteration in countable state average cost Markov decision processes with unbounded costs. Annals of Operations Research, Vol. 28, 1 (1991), 261--271.
[25]
Vishal Sharma, Ilsun You, Kangbin Yim, Ray Chen, and Jin-Hee Cho. 2019. BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems. IEEE Access, Vol. 7 (2019), 118556--118580.
[26]
Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, and Siwei Sun. 2019. Strongchain: Transparent and collaborative proof-of-work consensus. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 819--836.
[27]
Taotao Wang, Soung Chang Liew, and Shengli Zhang. 2019. When Blockchain Meets AI: Optimal Mining Strategy Achieved By Machine Learning. arXiv preprint arXiv:1911.12942 (2019).
[28]
Yang Xiao, Ning Zhang, Wenjing Lou, and Y Thomas Hou. 2020. A survey of distributed consensus protocols for blockchain networks. IEEE Communications Surveys & Tutorials, Vol. 22, 2 (2020), 1432--1465.
[29]
Ren Zhang and Bart Preneel. 2017. Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin. In Topics in Cryptology - CT-RSA - The Cryptographers' Track at the RSA Conference (Lecture Notes in Computer Science, Vol. 10159), Helena Handschuh (Ed.). Springer, 277--292.
[30]
Ren Zhang and Bart Preneel. 2019. Lay down the common metrics: Evaluating proof-of-work consensus protocols' security. In Symposium on Security and Privacy (SP). IEEE, 175--192.
[31]
Shijie Zhang and Jong-Hyouk Lee. 2019. Double-spending with a Sybil attack in the Bitcoin decentralized network. IEEE Transactions on Industrial Informatics, Vol. 15, 10 (2019), 5715--5722.
[32]
Yevhen Zolotavkin and Veronika Kuchta. 2019 Incentives for Harvesting Attack in Proof of Work Mining Pools. In European Symposium on Research in Computer Security. Springer, 703--725.

Cited By

View all
  • (2024)Understanding the Security Implications in O-RAN with Abusive AdversariesIndustrial Networks and Intelligent Systems10.1007/978-3-031-67357-3_16(215-235)Online publication date: 31-Jul-2024
  • (2023)Abusive adversarial agents and attack strategies in cyber‐physical systemsCAAI Transactions on Intelligence Technology10.1049/cit2.121718:1(149-165)Online publication date: 2-Feb-2023

Index Terms

  1. Evaluating Blockchain Protocols with Abusive Modeling

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
    May 2022
    1291 pages
    ISBN:9781450391405
    DOI:10.1145/3488932
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 May 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. abusive adversary
    2. blockchain
    3. markov decision process (mdp)
    4. protocol evaluations

    Qualifiers

    • Research-article

    Funding Sources

    • MOE AcRF Tier 2 grant
    • A*STAR (RIE2020 Advanced Manufacturing and Engineering (AME) Industry Alignment Fund)

    Conference

    ASIA CCS '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)27
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 16 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Understanding the Security Implications in O-RAN with Abusive AdversariesIndustrial Networks and Intelligent Systems10.1007/978-3-031-67357-3_16(215-235)Online publication date: 31-Jul-2024
    • (2023)Abusive adversarial agents and attack strategies in cyber‐physical systemsCAAI Transactions on Intelligence Technology10.1049/cit2.121718:1(149-165)Online publication date: 2-Feb-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media