Impact of Man-In-The-Middle Attacks on Ethereum

被引:39
作者
Ekparinya, Parinya [1 ]
Gramoli, Vincent [1 ,2 ]
Jourjon, Guillaume [2 ]
机构
[1] Univ Sydney, Sydney, NSW, Australia
[2] CSIRO, Data61, Sydney, NSW, Australia
来源
2018 IEEE 37TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS) | 2018年
基金
澳大利亚研究理事会;
关键词
D O I
10.1109/SRDS.2018.00012
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent theoretical attacks conjectured the vulnerabilities of mainstream blockchains through simulations or assumption violations. Unfortunately, previous results typically omit both the nature of the network under which the blockchain code runs and whether blockchains are private, consortium or public. In this paper, we study the public Ethereum blockchain as well as a consortium and private blockchains and quantify the feasibility of man-in-the-middle and double spending attacks against them. To this end, we list important properties of the Ethereum public blockchain topology, we deploy VMs with constrained CPU quantum to mimic the top-10 mining pools of Ethereum and we attack them, by first partitionning the network through BGP hijacking or ARP spoofing before issuing a Balance Attack to steal coins. Our results demonstrate that attacking Ethereum is remarkably devastating in a consortium or private context as the adversary can multiply her digital assets by 200, 000x in 10 hours through BGP hijacking whereas it would be almost impossible in a public context.
引用
收藏
页码:11 / 20
页数:10
相关论文
共 30 条
[1]  
[Anonymous], 1996, Guidelines for creation, selection, and registration of an autonomous system (as)
[2]  
[Anonymous], 2017, CAIDA AS RELATIONSHI
[3]   Hijacking Bitcoin: Routing Attacks on Cryptocurrencies [J].
Apostolaki, Maria ;
Zohar, Aviv ;
Vanbever, Laurent .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :375-392
[4]  
Bamert T, 2013, IEEE INT CONF PEER
[5]  
Buterin V., 2015, On public and private blockchains
[6]   Distributing trust on the Internet [J].
Cachin, C .
INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, :183-192
[7]  
Capkun S, 2012, IACR Cryptology ePrint Archive, V2012, P248
[8]  
Decker C., 2013, P IEEE INT C PEER TO
[9]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Guen .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :436-454
[10]  
Finney H., 2011, FINNEYS ATTACK