A Survey on Long-Range Attacks for Proof of Stake Protocols

被引:97
作者
Deirmentzoglou, Evangelos [1 ]
Papakyriakopoulos, Georgios [2 ]
Patsakis, Constantinos [1 ]
机构
[1] Univ Piraeus, Dept Informat, Piraeus 18534, Greece
[2] Cisco Secur Serv, Maroussi 15125, Greece
关键词
Blockchain proof of stake long-range attacks; SMART CONTRACTS;
D O I
10.1109/ACCESS.2019.2901858
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite common arguments about the prevalence of blockchain technology, in terms of security, privacy, and immutability, in reality, several attacks can be launched against them. This paper provides a systematic literature review on long-range attacks for proof of stake protocols. If successful, these attacks may take over the main chain and partially, or even completely, rewrite the history of transactions that are stored in the blockchain. To this end, we describe how proof of stake protocols work, their fundamental properties, their drawbacks, and their attack surface. After presenting long-range attacks, we discuss possible countermeasures and their applicability.
引用
收藏
页码:28712 / 28725
页数:14
相关论文
共 46 条
[1]  
[Anonymous], 2017, Casper the friendly finality gadget
[2]  
[Anonymous], 2015, INTRO CASPER FRIENDL
[3]  
[Anonymous], 2014, NXT COMMUNITY
[4]  
[Anonymous], 2008, TECH REP
[5]  
[Anonymous], 2002, TECH REP
[6]  
[Anonymous], 2017, FUTURE GENER COMPUT
[7]  
[Anonymous], Ppcoin: Peer-to-peer crypto-currency with proof-of-stake
[8]   A Survey of Attacks on Ethereum Smart Contracts (SoK) [J].
Atzei, Nicola ;
Bartoletti, Massimo ;
Cimoli, Tiziana .
PRINCIPLES OF SECURITY AND TRUST (POST 2017), 2017, 10204 :164-186
[9]  
Badertscher C., 2018, TECH REP
[10]  
Bartoletti M., 2017, DISSECTING PONZI SCH