loading
Papers Papers/2020

Research.Publish.Connect.

Paper

Paper Unlock
On Detection of Bitcoin Mining Redirection Attacks

Topics: Cryptographic Algorithms; Data Fraud and Data Fabrication; Data Integrity; e-Commerce and Contract Management Tools; Electronic Payment Fraud; P2P Transactions and Scenarios; Security and Privacy; Security Architecture and Design Analysis; Security Frameworks, Architectures and Protocols; Vulnerability Analysis and Countermeasures

Authors: Nicolas T. Courtois 1 ; Pinar Emirdag 2 and Zhouyixing Wang 1

Affiliations: 1 University College London, United Kingdom ; 2 Independent Market Structure Professional, United Kingdom

ISBN: 978-989-758-081-9

ISSN: 2184-4356

Keyword(s): e-Payment, Crypto Currencies, Bitcoin, Double-spending attacks, Hash Functions, Man-In-the-Middle Attacks, Stratum Protocol.

Related Ontology Subjects/Areas/Topics: Communication and Software Technologies and Architectures ; Computer-Supported Education ; Data Engineering ; Data Integrity ; Databases and Data Security ; e-Business ; Energy and Economy ; Enterprise Information Systems ; Information and Systems Security ; Information Technologies Supporting Learning ; Mobile and Pervasive Computing ; Security and Privacy ; Sustainable Computing and Communications ; Telecommunications

Abstract: In this paper we study the question of centralisation in bitcoin digital currency. In theory bitcoin has been designed to be a totally decentralized distributed system. Satoshi Nakamoto has very clearly postulated that each node should be collecting recent transactions and trying to create new blocks [Satoshi08]. In bitcoin transactions are aggregated in block in order to authenticate them and form an official ledger and history of bitcoin transactions. In practice as soon as expensive ASIC bitcoin miners have replaced general-purpose hardware, production of bitcoins and the validation of transactions has concentrated in the hands of a smaller group of people. Then at some moment in early 2012 an important decision was taken: the Stratum protocol was designed [Palatinus12] which took a deliberate decision to move the power of selecting which transactions are included in blocks from miners to pool managers. The growing difficulty of mining and large standard deviation in this proces s [Rosenfeld13, CourtoisBahack14] made that majority of miners naturally shifted to pooled mining. At this moment bitcoin ceased being a decentralized democratic system. In this paper we survey the question of a 51% attacks and show that there is a large variety of plausible attack scenarios. In particular we study one particularly subversive attack scenario which depends on non-trivial internal details of the bitcoin hashing process. How does it compare with the current mining practices? We have study the Stratum protocol in four popular real-life mining con figurations. Our analysis shows that pools could very easily cheat the majority of people. However the most subversive versions of the attack are NOT facilitated and could potentially be detected. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.235.227.117

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
T. Courtois, N.; Emirdag, P. and Wang, Z. (2015). On Detection of Bitcoin Mining Redirection Attacks. In Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP, ISBN 978-989-758-081-9; ISSN 2184-4356, pages 98-105. DOI: 10.5220/0005245600980105

@conference{icissp15,
author={Nicolas {T. Courtois}. and Pinar Emirdag. and Zhouyixing Wang.},
title={On Detection of Bitcoin Mining Redirection Attacks},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP,},
year={2015},
pages={98-105},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005245600980105},
isbn={978-989-758-081-9},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP,
TI - On Detection of Bitcoin Mining Redirection Attacks
SN - 978-989-758-081-9
IS - 2184-4356
AU - T. Courtois, N.
AU - Emirdag, P.
AU - Wang, Z.
PY - 2015
SP - 98
EP - 105
DO - 10.5220/0005245600980105

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.
0123movie.net