Three Attacks on Proof-of-Stake Ethereum
نویسندگان
چکیده
Recently, two attacks were presented against Proof-of-Stake (PoS) Ethereum: one where short-range reorganizations of the underlying consensus chain are used to increase individual validators’ profits and delay decisions, adversarial network is leveraged stall decisions indefinitely. We provide refined variants these attacks, considerably relaxing requirements on stake timing, thus rendering more severe. Combining techniques from both we obtain a third attack which allows an adversary with vanishingly small fraction no control over message propagation (assuming instead probabilistic propagation) cause even long-range reorganizations. Honest-but-rational or ideologically motivated validators could use this their protocol, threatening incentive alignment security PoS Ethereum. The can also lead destabilization congestion in vote processing.
منابع مشابه
Interactive Proof-of-stake
The paper examines decentralized cryptocurrency protocols that are based on the use of internal tokens as identity tools. An analysis of security problems with popular Proof-of-stake consensus protocols is provided. A new protocol, Interactive Proof-of-Stake, is proposed. The main ideas of the protocol are to reduce a number of variables a miner can iterate over to a minimum and also to bring a...
متن کاملProof of Stake versus Proof of Work
Proof of stake is a consensus mechanism for digital currencies that is an alternative to proof of work used in Bitcoin. The main declared advantages of proof of stake approaches are the absence of expensive computations and hence a lower entry barrier for block generation rewards. In this report, we examine the pros and cons of both consensus systems and show that existing implementations of pr...
متن کاملBitcoin Cooperative Proof-of-Stake
A hardfork reconfiguration of the peer to peer Bitcoin network is described that substitutes tamperevident logs and proofofstake consensus for proofofwork consensus. The block creation rewards and transaction fees are reallocated to establish and staff a secure financial data network capable of handling the world's transactions with subsecond response time. The new system pays dividends t...
متن کاملA survey of attacks on Ethereum smart contracts
Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need of an external trusted authority. Since smart contracts handle and transfer assets of considerable value, besides their correct execution it is also crucial that their implementation is secure against attacks which aim at stealing or tampering the assets. We study th...
متن کاملA Survey of Attacks on Ethereum Smart Contracts (SoK)
Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need of an external trusted authority. Since smart contracts handle and transfer assets of considerable value, besides their correct execution it is also crucial that their implementation is secure against attacks which aim at stealing or tampering the assets. We study th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2022
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-18283-9_28