Affiliation:
1. Koç University, Turkey
Abstract
The selfish mining (SM) attack of Eyal and Sirer allows a rational mining pool with a hash power (α) much less than 50% of the whole Bitcoin network to steal from the fair shares of honest miners. This attack has been studied extensively in various settings in order for its optimization and mitigation. In this context, Heilman proposes a defense “Freshness Preferred”, based on timestamps, which are issued routinely by a timestamp authority. In contrast, we consider the case where timestamps are generated by no authority; instead every miner includes the current time into a block freely. However, due to two attacks that we discover, this turns out to be a non-trivial task. These attacks are
Oracle mining
, which works by cleverly setting the timestamp to future, and
Bold mining
, which works by generating an alternative chain starting from a previous block. Unfortunately, these attacks are hard to analyze and optimize, and to our knowledge, the available tools fail to help us for this task. To ease this, we come up with generalized formulas for revenue and profitability of SM attacks. Our analyses show that the use of timestamps could be promising for selfish mining mitigation. Nevertheless, Freshness Preferred in its current form is quite vulnerable, as any rational miner with α > 0 can directly benefit from our attacks. To cope with this problem, we propose a novel SM mitigation algorithm
Fortis
without an authority, which protects the honest miners’ shares against any attacker with α < 27.0 against all the known SM-type attacks. By building upon the blockchain simulator BlockSim, we simulate our Oracle and Bold mining attacks against Freshness Preferred and
Fortis
. Simulation results also demonstrate the effectiveness of these attacks against the former and their ineffectiveness against the latter.
Funder
TÜBİTAK, the Scientific and Technological Research Council of Turkey
Publisher
Association for Computing Machinery (ACM)
Reference69 articles.
1. ESM: Selfish mining under ecological footprint
2. M. Alharbi. 2020. Blocksim Implementation. Retrieved November 01, 2020 from https://github.com/maher243/BlockSim
3. BlockSim: An Extensible Simulation Tool for Blockchain Systems
4. S. E. Alm. 2002. Simple Random Walk. Retrieved 06 June 2022 from http://www2.math.uu.se/sea/kurser/stokprocmn1/slumpvandring_eng.pdf
5. But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin