Revelio: A Network-Level Privacy Attack in the Lightning Network

被引:0
|
作者
von Arx, Theo [1 ]
Muoi Tran [1 ]
Vanbever, Laurent [1 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
关键词
ANONYMITY;
D O I
10.1109/EuroSP57164.2023.00060
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Lightning Network (LN) is a widely-adopted off-chain protocol that not only addresses Bitcoin's scaling problem but also enables anonymous payments. Prior attacks have shown that an adversary controlling several peers at the central position of the network (e.g., by hijacking payment routes) can deanonymize such payments. However, these attacks are highly observable or require many parties to collude. This paper presents Revelio, a stealthier, passive network-level privacy attack against LN that exploits its joint centralization at the application and the network layers. Indeed, network-level adversaries can see most of the LN traffic (e.g., five autonomous systems can see up to 80% of all observable communication channels) despite the encrypted communication between LN nodes and the widespread usage of Tor. This comprehensive view allows Revelio adversaries not only to estimate the payment amount but also to effectively reduce the anonymity size of its endpoints. We show that the Revelio attack is practical: it perfectly deanonymizes the senders or the receiver in almost one-third of tested payments in today's LN and underlying network topologies.
引用
收藏
页码:942 / 957
页数:16
相关论文
共 50 条
  • [1] Revelio: A Network-Level Privacy Attack in the Lightning Network
    Von Arx, Theo
    Tran, Muoi
    Vanbever, Laurent
    Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023, 2023, : 942 - 957
  • [2] Network-Level Security and Privacy Control for Smart-Home IoT Devices
    Sivaraman, Vijay
    Gharakheili, Hassan Habibi
    Vishwanath, Arun
    Boreli, Roksana
    Mehani, Olivier
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 163 - 167
  • [3] An Empirical Analysis of Privacy in the Lightning Network
    Kappos, George
    Yousaf, Haaroon
    Piotrowska, Ania
    Kanjalkar, Sanket
    Delgado-Segura, Sergi
    Miller, Andrew
    Meiklejohn, Sarah
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 167 - 186
  • [4] Equity and network-level maintenance scheduling
    Boyles, Stephen D.
    EURO JOURNAL ON TRANSPORTATION AND LOGISTICS, 2015, 4 (01) : 175 - 193
  • [5] Network-level analysis of kinase inhibitors
    White, Forest M.
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2007, 234
  • [6] Network-level Mechanisms of Ketamine Anesthesia
    Mashour, George A.
    ANESTHESIOLOGY, 2016, 125 (05) : 830 - 831
  • [7] Network-Level Adversaries in Federated Learning
    Severi, Giorgio
    Jagielski, Matthew
    Yar, Gokberk
    Wang, Yuxuan
    Oprea, Alina
    Nita-Rotaru, Cristina
    2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, : 19 - 27
  • [8] Network-level analysis of kinase inhibitors
    White, M.
    CHEMICAL RESEARCH IN TOXICOLOGY, 2007, 20 (12) : 2018 - 2018
  • [9] Understanding the network-level behavior of sparrimers
    Ramachandran, Anirudh
    Feamster, Nick
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) : 291 - 302
  • [10] Network-Level Pavement Structural Evaluation
    Rada, Gonzalo R.
    Nazarian, Soheil
    Siddharthan, Raj V.
    Thyagarajan, Senthilmurugan
    Visintine, Beth A.
    Nasimifar, Mahdi
    Velarde, Jorge
    JOURNAL OF INFRASTRUCTURE SYSTEMS, 2018, 24 (04)