Abstract
Mining attacks allow attackers to gain an unfair share of the mining reward by deviating from the honest mining strategy in the Bitcoin system. Among the most well-known are block withholding (BWH), fork after withholding (FAW), and selfish mining. In this paper, we propose two new strategies: power adjusting and bribery racing, and introduce two novel mining attacks, Power Adjusting Withholding (PAW) and Bribery Selfish Mining (BSM) adopting the new strategies. Both attacks can increase the reward of attackers. Furthermore, we show PAW can avoid the “miner's dilemma” in BWH attacks. BSM introduces a new “venal miner's dilemma”, which results in all targets (bribes) willing to help the attacker but getting less reward finally. Quantitative analyses and simulations are conducted to verify the effectiveness of our attacks. We propose some countermeasures to mitigate the new attacks, but a practical and efficient solution remains to be an open problem.
Original language | English |
---|---|
Title of host publication | CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security |
Publisher | Association for Computing Machinery (ACM) |
Pages | 833-850 |
Number of pages | 18 |
ISBN (Print) | 9781450367479 |
DOIs | |
Publication status | Published - 6 Nov 2019 |
Event | 26th ACM SIGSAC Conference on Computer and Communications Security, CCS 2019 - London, United Kingdom Duration: 11 Nov 2019 → 15 Nov 2019 https://dl.acm.org/doi/proceedings/10.1145/3319535 |
Publication series
Name | Proceedings of the ACM Conference on Computer and Communications Security |
---|---|
ISSN (Print) | 1543-7221 |
Conference
Conference | 26th ACM SIGSAC Conference on Computer and Communications Security, CCS 2019 |
---|---|
Country/Territory | United Kingdom |
City | London |
Period | 11/11/19 → 15/11/19 |
Internet address |
Scopus Subject Areas
- Software
- Computer Networks and Communications
User-Defined Keywords
- Bitcoin
- Block withholding
- Blockchain
- Bribery attack
- Fork after withholding
- Mining attacks
- Selfish mining