Affiliation:
1. University of Sydney, Australia
2. CSIRO, Australia
3. EPFL, University of Sydney and Redbelly Network, Australia
Abstract
Traditional blockchain systems offer a secure way of tracking the ownership of digital assets as long as the attacker does not control a large portion of the overall computational or mining power. They typically require participants to generate a proof-of-work before proposing a block at a given index of the chain. To choose one block among the candidate blocks at the same index, Nakamoto’s consensus,
Ghost
and the original Ethereum’s consensus select, respectively, the longest branch, the heaviest subtree and the branch with the most difficult crypto-puzzles. This allows an attacker who can generate proofs-of-work faster than others to double spend by overwriting any given branch.
In this paper, we present a double spending attack, called the Balance attack, that simply needs to delay some messages. This result sheds new lights on an important, often implicit, assumption of the blockchain,
synchrony
, under which the transmission delay of any message should be within a known upper bound. We show that the attack succeeds with high probability on the protocols of the two largest blockchain systems in market capitalization, Bitcoin and Ethereum. To quantify the impact of our attack, we replicated the blockchain network run by fifty financial institutions and achieved double spending in less than 20 minutes. Finally, we demonstrate the success of the attack empirically by modifying the
geth
software and hijacking BGP in a controlled distributed system whose distribution of mining power is set to the distribution observed on the Ethereum main blockchain.
Publisher
Association for Computing Machinery (ACM)
Reference75 articles.
1. “CAIDA: Center for Applied Internet Data Analysis.”
2. “DB-IP - IP Geolocation and Network Intelligence.” [Online]. Available: https://db-ip.com/
3. “IP Address Details - ipinfo.io.” [Online]. Available: http://ipinfo.io/
4. “IP Address Geolocation to trace Country Region City ZIP Code etc.” [Online]. Available: https://www.eurekapi.com/
5. “IP Address to Identify Geolocation Information.” [Online]. Available: http://www.ip2location.com/